In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process.
References
Link | Resource |
---|---|
https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md | Exploit Third Party Advisory |
https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20Security/Local%20Privilege%20Escalation/v16.0.0120/README.md - Exploit, Third Party Advisory |
Information
Published : 2019-10-28 15:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-16897
Mitre link : CVE-2019-16897
CVE.ORG link : CVE-2019-16897
JSON object : View
Products Affected
k7computing
- k7_antivirus_premium
- k7_total_security
- k7_ultimate_security
CWE
CWE-269
Improper Privilege Management