First published: Thu Feb 20 2020(Updated: )
** DISPUTED ** Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK. NOTE: Vendor asserts that vulnerability does not exist in product.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avira Anti-malware Sdk | <8.3.54.138 | |
Avira Antivirus Server | <8.3.54.138 | |
Avira Avira Antivirus For Endpoint | <8.3.54.138 | |
Avira Avira Antivirus For Small Business | <8.3.54.138 | |
Avira Avira Exchange Security | <8.3.54.138 | |
Avira Avira Free Security Suite | <8.3.54.138 | |
Avira Avira Internet Security Suite | <8.3.54.138 | |
Avira Avira Prime | <8.3.54.138 | |
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 | ||
<8.3.54.138 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Avira AV Engine vulnerability is CVE-2020-9320.
Versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite are affected by this vulnerability.
CVE-2020-9320 has a severity rating of 5.5 (medium).
The virus-detection bypass can be achieved by using a crafted ISO archive.
Yes, the fix for CVE-2020-9320 is to update Avira AV Engine to version 8.3.54.138 or later.