First published: Tue Jan 16 2018(Updated: )
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing AntiVirus | <15.1.0.53 | |
K7 Computing AntiVirus | <15.1.0308 | |
k7computing endpoint | <14.2.0137 | |
K7 Computing Internet Security | <15.1.0297 | |
K7 Computing Total Security | <15.1.0324 | |
K7 Computing Total Security | <16.0.0131 | |
K7 Ultimate Security | <15.1.0324 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16552 is classified as a high severity vulnerability due to its potential for privilege escalation.
To mitigate the effects of CVE-2017-16552, users should upgrade K7 Antivirus software to version 15.1.0.53 or later.
Attackers can exploit CVE-2017-16552 to write to arbitrary memory locations, potentially allowing them to gain elevated privileges.
CVE-2017-16552 affects K7 Antivirus Premium versions prior to 15.1.0.53, as well as several other versions of K7 products.
Yes, exploiting CVE-2017-16552 requires a specific set of IOCTL calls that target vulnerabilities in the software.