Vulnerabilites related to avira - avira_security
CVE-2022-4429 (GCVE-0-2022-4429)
Vulnerability from cvelistv5
Published
2023-01-10 09:28
Modified
2025-04-08 14:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-428 - Unquoted Search Path or Element
Summary
Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service. The issue was fixed with Avira Security version 1.1.78
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
NortonLifelock (GenDigital) | Avira Security for Windows |
Version: up to version 1.1.77 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:41:44.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-4429", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T14:50:02.103827Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T14:51:04.236Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avira Security for Windows", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "up to version 1.1.77" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAvira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe issue was fixed with Avira Security version 1.1.78\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e" } ], "value": "Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service.\u00a0The issue was fixed with Avira Security version 1.1.78\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Denial of Service" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-428", "description": "CWE-428 Unquoted Search Path or Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-10T09:28:41.375Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Avira Security for Windows - Denial of Service", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2022-4429", "datePublished": "2023-01-10T09:28:41.375Z", "dateReserved": "2022-12-12T17:47:07.937Z", "dateUpdated": "2025-04-08T14:51:04.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-3368 (GCVE-0-2022-3368)
Vulnerability from cvelistv5
Published
2022-10-17 20:52
Modified
2025-05-10 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Privilege Escalation
Summary
A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Nortonlifelock | "Avira Security" – for Windows |
Version: all < 1.1.71.30554 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-3368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-10T02:50:41.360196Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-10T02:51:08.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "\"Avira Security\" \u2013 for Windows", "vendor": "Nortonlifelock", "versions": [ { "lessThan": "1.1.71.30554", "status": "affected", "version": "all", "versionType": "custom" } ] } ], "datePublic": "2022-10-11T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-17T00:00:00.000Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "advisory": "NLOKSA1507", "discovery": "EXTERNAL" }, "title": "Software Updater of Avira Security for Windows vulnerable to Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2022-3368", "datePublished": "2022-10-17T20:52:01.381Z", "dateReserved": "2022-09-30T00:00:00.000Z", "dateUpdated": "2025-05-10T02:51:08.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-4294 (GCVE-0-2022-4294)
Vulnerability from cvelistv5
Published
2023-01-10 09:14
Modified
2025-04-08 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | NortonLifelock (GenDigital) | Norton Antivirus Windows Eraser Engine |
Version: prior to 119.1.5.1 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:50.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-4294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T14:53:38.976759Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-08T14:54:30.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Norton Antivirus Windows Eraser Engine", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "prior to 119.1.5.1" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avira Security ", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "prior to 1.1.78" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Avast Antivirus", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "Prior to 22.10" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "AVG Antivirus", "vendor": "NortonLifelock (GenDigital)", "versions": [ { "status": "affected", "version": "Prior to 22.10" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eNorton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-10T09:22:11.371Z", "orgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "shortName": "NLOK" }, "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Norton, Avira, Avast and AVG Antivirus for Windows Privilege Escalation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dbd8429d-f261-4b1e-94cc-ae3132817e2e", "assignerShortName": "NLOK", "cveId": "CVE-2022-4294", "datePublished": "2023-01-10T09:14:47.102Z", "dateReserved": "2022-12-05T17:46:00.115Z", "dateUpdated": "2025-04-08T14:54:30.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-01-10 10:15
Modified
2024-11-21 07:34
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | avira_security | * | |
norton | power_eraser | * | |
avast | antivirus | * | |
avg | antivirus | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:avira_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AE949420-907D-4EBC-945B-A3EBEEC08532", "versionEndExcluding": "1.1.78", "vulnerable": true }, { "criteria": "cpe:2.3:a:norton:power_eraser:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7703323C-C9D2-4338-864A-1AA2F99821FA", "versionEndExcluding": "119.1.5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "22365077-58F2-4607-8EB8-79CDDF74348D", "versionEndExcluding": "22.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:avg:antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "AADAEC20-387E-4CF4-B0A5-DE5C9092C37A", "versionEndExcluding": "22.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.\n" }, { "lang": "es", "value": "Norton, Avira, Avast y AVG Antivirus para Windows pueden ser susceptibles a una vulnerabilidad de escalada de privilegios, que es un tipo de problema por el cual un atacante puede intentar comprometer la aplicaci\u00f3n de software para obtener acceso elevado a recursos que normalmente est\u00e1n protegidos de una aplicaci\u00f3n o usuario." } ], "id": "CVE-2022-4294", "lastModified": "2024-11-21T07:34:57.510", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-10T10:15:12.933", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-10 10:15
Modified
2024-11-21 07:35
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service. The issue was fixed with Avira Security version 1.1.78
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | avira_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:avira_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AE949420-907D-4EBC-945B-A3EBEEC08532", "versionEndExcluding": "1.1.78", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service.\u00a0The issue was fixed with Avira Security version 1.1.78\n" }, { "lang": "es", "value": "Avira Security para Windows contiene un \"unquoted service path\" que permite a atacantes con privilegios administrativos locales provocar una denegaci\u00f3n de servicio. El problema se solucion\u00f3 con Avira Security versi\u00f3n 1.1.78" } ], "id": "CVE-2022-4429", "lastModified": "2024-11-21T07:35:14.793", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-10T10:15:13.737", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "security@nortonlifelock.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-17 21:15
Modified
2025-05-10 03:15
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
avira | avira_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avira:avira_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1A9176EF-59A0-4484-B979-ACE5B1F944B1", "versionEndIncluding": "1.1.71.30554", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad Software Updater de Avira Security for Windows permit\u00eda a un atacante con acceso de escritura al sistema de archivos escalar sus privilegios en determinados escenarios. El problema ha sido corregido con Avira Security versi\u00f3n 1.1.72.30556" } ], "id": "CVE-2022-3368", "lastModified": "2025-05-10T03:15:21.137", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "security@nortonlifelock.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-17T21:15:10.513", "references": [ { "source": "security@nortonlifelock.com", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html" } ], "sourceIdentifier": "security@nortonlifelock.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }