CVE ID | CVE-2023-32176 |
CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
VIPRE |
AFFECTED PRODUCTS |
Antivirus Plus |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Antivirus Plus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the SetPrivateConfig method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
ADDITIONAL DETAILS |
VIPRE has issued an update to correct this vulnerability. More details can be found at:
https://success.vipre.com/en_US/antivirus-plus-release-notes/home-plus-release-notes-20230530 |
DISCLOSURE TIMELINE |
|
CREDIT | Yulin Sung - Trend Micro Zero Day Initiative |