Hacking

Experts warn of flaws in popular Antivirus solutions

Researchers disclosed details of security flaws in popular antivirus software that could allow threat actors to increase privileges.

Security researchers from CyberArk Labs disclosed details of security vulnerabilities found in popular antivirus software that could be exploited by attackers to elevate their privileges on the target system.

Antivirus solutions that are supposed to protect the systems from infection may unintentionally allow malware in escalating privileges on the system. 

Anti-malware products run with high privileges, this means that the exploitation of any issues in these solutions could allow malicious software to elevated permissions and perform multiple malicious actions.

Experts explained that multiple anti-malware products are vulnerable to exploitation via file manipulation attacks, including antivirus solutions from Kaspersky, McAfee, NortonLifeLock, Fortinet, Check Point, Trend Micro, Avira, and Microsoft Defender. The good news is that all the above security vendors have addressed the vulnerabilities reported by the researchers.

The researchers explained that one of the root causes for many issues they have discovered is the default DACLs of the C:\ProgramData directory. On Windows, the ProgramData directory is used by applications to store data, any user has read/write permissions on ProgramData instead of the %LocalAppData%, which is accessible by the current logged in user.

“We begin with the first cause of many bugs, which is the default DACLs of the C:\ProgramData directory. On Windows, the ProgramData directory is used by applications to store data that is not specific to a user. This means that processes\services that are not tied to a specific user would probably use ProgramData instead of the %LocalAppData%, which is accessible by the current logged in user.” reads the analysis published by CyberArk. “I assume this is the reason why ProgramData has permissive DACLs by design so that every user can access directories there freely.”

Attackers could exploit some of the flaws to delete files from arbitrary locations.

A privilege escalation could be achieved when a non-privileged process creates a new folder in “ProgramData” that could be later accessed by a privileged process, like the one associated with an antivirus solution.

To better understand the conditions that could determine the exploitation of the flaws, the analysis provides details about a shared Log File issue that affects the antivirus solution designed by Avira.

An attacker could exploit the privileged process to delete the file and create a symlink that would point to any arbitrary file on the target system with malicious content.

CyberArk researchers also explained that it is possible to create a new folder in “C:\ProgramData” before a privileged process, associated with an antivirus software, is executed.

The experts pointed out that McAfee antivirus installer is executed after creating the “McAfee” folder, the standard user has full control over the directory, this means that the local user could gain elevated permissions through a symlink attack.

Experts also reported DLL hijacking flaws in Trend Micro, Fortinet, and other antivirus solutions that could allow attackers to execute a malicious DLL after having placed it into the application directory and elevate privileges.

DLL Hijacking attacks could be mitigated by updating the update of the installation frameworks.  

“The implications of these bugs are often full privilege escalation of the local system,” concludes CyberArk. “Due to the high privilege level of security products, an error in them could help malware to sustain its foothold and cause more damage to the organization. The exploits that were presented here are easy to implement, but also easy to patch against.”

The complete list of issues discovered by the experts is reported below:

  • Kaspersky CVE-2020-25045, CVE-2020-25044, CVE-2020-25043
  • McAfee CVE-2020-7250, CVE-2020-7310
  • NortonLifeLock CVE-2019-19548
  • Fortinet CVE-2020-9290
  • Checkpoint CVE-2019-8452
  • Trend Micro CVE-2019-19688, CVE-2019-19689 +3
  • Avira – CVE-2020-13903
  • Microsoft-CVE-2019-1161
  • Avast + F-Secure – Waiting for Mitre
[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, antivirus)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.