First published: Mon Oct 02 2017(Updated: )
The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nCipher | <=0.7.5.0 | |
VeraCrypt | <=1.14 | |
TrueCrypt | =7.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7358 is classified as a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2015-7358, upgrade TrueCrypt to version 7.1 or later, VeraCrypt to version 1.15 or later, or CipherShed to a fixed version.
CVE-2015-7358 affects TrueCrypt 7.0, VeraCrypt versions up to 1.14, and CipherShed versions up to 0.7.5.0 on Windows.
CVE-2015-7358 is a privilege escalation vulnerability that allows local users to mount encrypted volumes improperly.
An attacker can exploit CVE-2015-7358 to gain elevated privileges by mounting an encrypted volume over an existing drive letter.