Risk | High |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2020-10868 CVE-2020-10867 CVE-2020-10866 CVE-2020-10864 CVE-2020-10863 CVE-2020-10862 CVE-2020-10861 CVE-2020-10860 CVE-2020-10865 |
CWE-ID | CWE-284 CWE-20 CWE-264 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Avast Antivirus Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | Avast Software s.r.o. |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU26547
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10868
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in che aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and launch the Repair App RPC call from a Low Integrity process.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26544
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10867
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26543
Risk: High
CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10866
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and enumerate the network interfaces and access points from a Low Integrity process via RPC.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26542
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10864
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can trigger a reboot via RPC from a Low Integrity process.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26541
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10863
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26540
Risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10862
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to improper permission checks in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A local attacker can gain elevated privileges via RPC on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26539
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10861
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and delete arbitrary files from Avast Program Path via RPC, when Self Defense is Enabled.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26538
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10860
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the aswAvLog Log Library. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.
Install updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26537
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-10865
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and make arbitrary changes to the Components section of the "Stats.ini" file via RPC from a Low Integrity process.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAvast Antivirus: 19.8.2393
External linkshttp://forum.avast.com/index.php?topic=232420.0
http://forum.avast.com/index.php?topic=232423.0
http://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.