TotalAV 2020 4.14.31 has a quarantine flaw that allows privilege escalation. Exploitation uses an NTFS directory junction to restore a malicious DLL from quarantine into the system32 folder.
References
Link | Resource |
---|---|
https://bogner.sh/2017/11/avgater-getting-local-admin-by-abusing-the-anti-virus-quarantine/ | Third Party Advisory |
https://www.youtube.com/watch?v=88qeaLq98Gc | Exploit Third Party Advisory |
https://bogner.sh/2017/11/avgater-getting-local-admin-by-abusing-the-anti-virus-quarantine/ | Third Party Advisory |
https://www.youtube.com/watch?v=88qeaLq98Gc | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://bogner.sh/2017/11/avgater-getting-local-admin-by-abusing-the-anti-virus-quarantine/ - Third Party Advisory | |
References | () https://www.youtube.com/watch?v=88qeaLq98Gc - Exploit, Third Party Advisory |
Information
Published : 2020-01-10 18:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-18194
Mitre link : CVE-2019-18194
CVE.ORG link : CVE-2019-18194
JSON object : View
Products Affected
totalav
- totalav_2020
CWE