Memory Access Vulnerability in K7 Total Security by K7 Computing
CVE-2017-18019

7.1HIGH

Key Information:

Vendor
CVE Published:
4 January 2018

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2017-18019?

The K7 Total Security software prior to version 15.1.0.305 contains a vulnerability that allows user-controlled input to be inadequately sanitized, permitting attackers to compare arbitrary memory addresses with fixed values. This flaw can be exploited to read sensitive memory content. Additionally, the product is susceptible to crashing during a DeviceIoControl call involving an invalid kernel pointer, posing further risks to system stability.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2017-18019 : Memory Access Vulnerability in K7 Total Security by K7 Computing