| CVE ID | CVE-2023-32179 | 
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
| AFFECTED VENDORS | VIPRE | 
| AFFECTED PRODUCTS | Antivirus Plus | 
| VULNERABILITY DETAILS | This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Antivirus Plus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the FPQuarTransfer method. By creating a symbolic link, an attacker can abuse the method to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. | 
| ADDITIONAL DETAILS | VIPRE has issued an update to correct this vulnerability. More details can be found at: https://success.vipre.com/en_US/antivirus-plus-release-notes/home-plus-release-notes-20230530 | 
| DISCLOSURE TIMELINE | 
 | 
| CREDIT | Yulin Sung - Trend Micro Zero Day Initiative |