VIPRE Antivirus Plus SetPrivateConfig Directory Traversal Local Privilege Escalation Vulnerability
CVE-2023-32176

7.8HIGH

Key Information:

Vendor

Vipre

Vendor
CVE Published:
3 May 2024

What is CVE-2023-32176?

A vulnerability has been identified in VIPRE Antivirus Plus that permits local attackers to escalate their privileges on affected installations. This issue originates from a flaw in the SetPrivateConfig method, where user-supplied paths are not properly validated prior to being used in file operations. Consequently, an attacker who has the capability to execute low-privileged code on the system can exploit this vulnerability to escalate privileges and execute arbitrary code under the context of the SYSTEM. It is imperative for users of VIPRE Antivirus Plus to remain vigilant and apply any security advisories released by the vendor.

Affected Version(s)

Antivirus Plus VIPRE Antivirus Plus v11.0.6.22

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-32176 : VIPRE Antivirus Plus SetPrivateConfig Directory Traversal Local Privilege Escalation Vulnerability