First published: Mon Oct 28 2019(Updated: )
In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Antivirus Premium | >=16.0.000<=16.0.0120 | |
K7 Total Security | >=16.0.000<=16.0.0120 | |
K7 Ultimate Security | >=16.0.000<=16.0.0120 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16897 is classified as a high-severity vulnerability due to its potential for local privilege escalation.
To mitigate CVE-2019-16897, update K7 Antivirus Premium, K7 Total Security, or K7 Ultimate Security to version 16.0.0121 or later.
CVE-2019-16897 can allow attackers to perform arbitrary registry writes with elevated privileges.
CVE-2019-16897 affects K7 Antivirus Premium, K7 Total Security, and K7 Ultimate Security versions 16.0.000 through 16.0.0120.
Users of K7 Antivirus Premium, K7 Total Security, and K7 Ultimate Security running vulnerable versions are at risk from CVE-2019-16897.