First published: Fri May 03 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Antivirus Plus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the TelFileTransfer method. By creating a symbolic link, an attacker can abuse the method to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
GFI VIPRE Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32178 has a high severity rating due to its potential for privilege escalation.
To fix CVE-2023-32178, users should update VIPRE Antivirus Plus to the latest version provided by the vendor.
CVE-2023-32178 affects installations of VIPRE Antivirus Plus that have not been patched.
CVE-2023-32178 can enable local attackers to execute code with elevated privileges on affected systems.
Currently, there are no known workarounds for CVE-2023-32178; the best mitigation is to apply the software update.