TotalAV 2020 4.14.31 Privilege Escalation

2020.01.11
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: CWE-264

# Exploit Title: TotalAV 2020 4.14.31 - Privilege Escalation # Date: 2020-01-09 # Exploit Author: Kusol Watchara-Apanukorn # Vendor Homepage: https://www.totalav.com/ # Version: 4.14.31 # Fixed on: 5.3.35 # Tested on: Windows 10 x64 # CVE : N/A # Vulnerability Description: # TotalAV 2020 4.14.31 has quarantine flaw that allows attacker escape of # privilege by using NTFS directory junction. **You can download vulnerability version with this link: https://install.protected.net/windows/cdn3/4.14.31/TotalAV_Setup.exe /////////////////////////////////// Proof of Concept ////////////////////////////////// 1. Plant the malicious file in this case we use DLL file 2. To exploit the vulnerability antivirus must detect the malicious dll 3. Move it to quarantine. 4. Attacker must create NTFS directory junction to restore Full step: https://www.youtube.com/watch?v=88qeaLq98Gc Vulnerability Disclosure Timeline: ================================== 17 Oct, 19 : Found Vulnerability 18 Oct, 19 : Vendor Notification 18 Oct, 19 : Request CVE 21 Oct, 19 : Vendor Response mid Dec, 19 : Vendor released new patched (v5.3.35) 09 Jan, 20: Vulnerability Disclosure


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top