SB2020122201 - Arbitrary file deletion in MalwareBytes Endpoint Protection
Published: December 22, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Link following (CVE-ID: CVE-2020-28641)
The vulnerability allows a local user to delete arbitrary files on the system.
The vulnerability exists within the file quarantine mechanism due to software fails to verify if the target file is a symbolic link before deleting it. A local user can create a symbolic link to arbitrary file on the system and delete the file with elevated privileges.
Remediation
Install update from vendor's website.
References
- https://fortiguard.com/zeroday/FG-VD-20-119
- https://support.malwarebytes.com/hc/en-us/articles/360058885974-Arbitrary-file-deletion-vulnerability-fixed-in-Malwarebytes-for-Windows
- https://support.malwarebytes.com/hc/en-us/articles/1500000403501-Arbitrary-file-deletion-vulnerability-fixed-in-Malwarebytes-Endpoint-Protection