First published: Wed Mar 21 2018(Updated: )
A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Malwarebytes Anti-Malware | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10717 is classified as a moderate severity vulnerability due to its impact on the whitelisting feature in Malwarebytes Anti-Malware.
To fix CVE-2016-10717, update Malwarebytes Anti-Malware to version 3.0.4 or later.
CVE-2016-10717 affects Malwarebytes Anti-Malware consumer version 2.2.1 and earlier.
An attacker may exploit CVE-2016-10717 to gain control over the exclusions.dat file and execute unauthorized applications.
CVE-2016-10717 was disclosed in 2016.