First published: Tue Jan 16 2018(Updated: )
In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing AntiVirus | <15.1.0.53 | |
K7 Computing AntiVirus | <15.1.0308 | |
k7computing endpoint | <14.2.0137 | |
K7 Computing Internet Security | <15.1.0297 | |
K7 Computing Total Security | <15.1.0324 | |
K7 Computing Total Security | <16.0.0131 | |
K7 Ultimate Security | <15.1.0324 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17429 has a high severity level due to its potential to allow local users to access raw hard disk data without proper authentication.
To fix CVE-2017-17429, users should update K7 Antivirus Premium to version 15.1.0.53 or later.
CVE-2017-17429 affects K7 Antivirus Premium versions prior to 15.1.0.53 and other K7 products with similar version limitations.
CVE-2017-17429 is a local vulnerability that requires physical access to the affected machine.
An attacker can exploit CVE-2017-17429 by sending a specific IOCTL to gain unauthorized access to raw hard disk data.