OS Command Injection Vulnerability in MicroWord eScan Antivirus for Linux
CVE-2025-1369
2LOW
Key Information:
- Vendor
- Microword
- Status
- Escan Antivirus
- Vendor
- CVE Published:
- 17 February 2025
Badges
👾 Exploit Exists
Summary
A significant OS command injection vulnerability has been identified in MicroWord eScan Antivirus version 7.0.32 on Linux. This flaw exists within an unspecified functionality of the USB Password Handler component. Attackers may exploit this vulnerability through local means, necessitating physical access or authenticated access to the vulnerable system. While experts denote the execution complexity as high, the public disclosure of the exploit increases the risk of potential attacks. MicroWord has been informed of the vulnerability but has not provided a response, leaving users exposed to possible exploit scenarios.
Affected Version(s)
eScan Antivirus 7.0.32
References
CVSS V4
Score:
2
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
FPT IS Security (VulDB User)