Advisory Details

September 27th, 2023

(0Day) Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability

ZDI-23-1475
ZDI-CAN-20383

CVE ID CVE-2023-42125
CVSS SCORE 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Avast
AFFECTED PRODUCTS Premium Security
VULNERABILITY DETAILS

This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.

ADDITIONAL DETAILS

02/22/23 – ZDI reported the vulnerability to the vendor.

03/03/23 – Vendor states that a fix has been prepared, and it should be included in the next release.

08/18/23 – ZDI asked for an update.

09/22/23 – ZDI asked for an update and informed the vendor that we intend to publish the case as a zero-day advisory on 09/27/23.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2023-02-22 - Vulnerability reported to vendor
  • 2023-09-27 - Coordinated public release of advisory
  • 2023-10-23 - Advisory Updated
CREDIT Abdelhamid Naceri
BACK TO ADVISORIES