First published: Fri Nov 22 2024(Updated: )
Avast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23731.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avast Antivirus | ||
Avast Antivirus | =24.2.6105-build_24.2.8918.827 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7233 is classified as a local privilege escalation vulnerability, allowing attackers to escalate their access privileges.
To fix CVE-2024-7233, users should update their Avast Free Antivirus to the latest version provided by Avast.
CVE-2024-7233 affects installations of Avast Free Antivirus prior to the fixed version.
An attacker can exploit CVE-2024-7233 to gain elevated privileges on a system running the affected version of Avast Free Antivirus.
There are currently no known effective workarounds for CVE-2024-7233 other than applying the necessary software update.