First published: Wed Sep 27 2023(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Avast Premium Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20383 is considered high due to its potential for privilege escalation.
To fix ZDI-CAN-20383, ensure that you update Avast Premium Security to the latest version provided by the vendor.
ZDI-CAN-20383 affects users of Avast Premium Security installations.
The potential impact of ZDI-CAN-20383 includes unauthorized access and control over the system by exploiting local privilege escalation.
An attacker exploits ZDI-CAN-20383 by executing low-privileged code on the affected system to escalate privileges.