First published: Wed Jan 29 2025(Updated: )
A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
MicroWorld Technologies eScan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0797 has been declared as problematic due to incorrect default permissions in the Quarantine Handler.
To fix CVE-2025-0797, review and adjust the file permissions in the /var/Microworld/ directory of your MicroWorld eScan Antivirus installation.
CVE-2025-0797 specifically affects MicroWorld eScan Antivirus version 7.0.32 on Linux systems.
CVE-2025-0797 is classified as a permissions-related vulnerability affecting the Quarantine Handler component.
Yes, improper default permissions for CVE-2025-0797 could potentially allow unauthorized access or manipulation of quarantined files.