Memory Access Vulnerability in K7 Total Security by K7 Computing
CVE-2017-18019
Key Information:
- Vendor
K7computing
- Status
- Vendor
- CVE Published:
- 4 January 2018
Badges
What is CVE-2017-18019?
The K7 Total Security software prior to version 15.1.0.305 contains a vulnerability that allows user-controlled input to be inadequately sanitized, permitting attackers to compare arbitrary memory addresses with fixed values. This flaw can be exploited to read sensitive memory content. Additionally, the product is susceptible to crashing during a DeviceIoControl call involving an invalid kernel pointer, posing further risks to system stability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
