Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or paths. The root cause is insufficient synchronization and lack of robust final-path validation in the threat-removal workflow: the agent records an active-response action and proceeds to perform deletion without guaranteeing the deletion target is the originally intended file. This can result in SYSTEM-level arbitrary file or folder deletion and consequent local privilege escalation. Wazuh made an attempted fix via pull request 8697 on 2025-07-10, but that change was incomplete.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Wazuh
         Wazuh wazuh  | 
|
| Vendors & Products | 
        
        Wazuh
         Wazuh wazuh  | 
Tue, 28 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 28 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Wazuh's File Integrity Monitoring (FIM), when configured with automatic threat removal, contains a time-of-check/time-of-use (TOCTOU) race condition that can allow a local, low-privileged attacker to cause the Wazuh service (running as NT AUTHORITY\SYSTEM) to delete attacker-controlled files or paths. The root cause is insufficient synchronization and lack of robust final-path validation in the threat-removal workflow: the agent records an active-response action and proceeds to perform deletion without guaranteeing the deletion target is the originally intended file. This can result in SYSTEM-level arbitrary file or folder deletion and consequent local privilege escalation. Wazuh made an attempted fix via pull request 8697 on 2025-07-10, but that change was incomplete. | |
| Title | Wazuh File Integrity Monitoring (FIM) & Active Response Arbitrary File Deletion as SYSTEM | |
| Weaknesses | CWE-367 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-28T15:48:15.981Z
Updated: 2025-10-28T18:21:22.793Z
Reserved: 2025-04-15T19:15:22.581Z
Link: CVE-2025-34294
Updated: 2025-10-28T18:20:10.633Z
Status : Awaiting Analysis
Published: 2025-10-28T16:15:37.167
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-34294
No data.
ReportizFlow