News

In free Bitdefender antivirus fixed vulnerability, which led to escalation of privileges

SafeBreach specialists discovered a vulnerability in the free antivirus Bitdefender Antivirus Free 2020 (up to version 1.0.15.138 that fixes the problem).

The bug received the identifier CVE-2019-15295 and scored 5.9 points on the CVSS vulnerability rating scale. The vulnerability could be used by attackers to elevate privileges to the SYSTEM level.

The problem is related to the lack of proper verification of downloadable binaries: it is not checked whether they are signed and downloaded from a trusted location.

“NT AUTHORITY\SYSTEM – the most privileged user account. This kind of service might be exposed to a user-to-SYSTEM privilege escalation, which is very useful and powerful to an attacker. The executable of the service is signed by BitDefender and if the hacker finds a way to execute code within this process, it can be used as an application whitelisting bypass which can lead to security product evasion”, — write SafeBreach specialists.

The vulnerability is directly associated with the ServiceInstance.dll library, which is downloaded by the BitDefender update service (updatesrv.exe) and the BitDefender security service (vsserv.exe), which are signed by Bitdefender and operate with SYSTEM privileges. In turn, ServiceInstance.dll loads the RestartWatchDog.dll library.

Since RestartWatchDog.dll is not loading safely, the antivirus application does not guarantee that the downloaded library file has been signed. This allows an attacker who has access to a system running Bitdefender Antivirus Free 2020 to install a malicious version of the library that will work instead of the legitimate one.

To ensure success of the attack, user or process with administrator privileges must first change the PATH to include the folder in which the attacker wants to inject the malicious DLL. You will also need to set the appropriate permissions for this directory so that a user without administrator rights can write files to it.

“Despite the fact it’s an antivirus, these services are running as non-PPL, which means that CIG (Code Integrity Guard) is not enforced, so unsigned code loading is possible into these processes”, — report researchers.

SafeBreach researchers note that they recently revealed a very similar vulnerability in Trend Micro’s password manager. It also allowed insecure loading of the DLL and allowed the attacker to increase privileges in the system.

Currently, Bitdefender specialists have already fixed the problem by releasing an updated version of their antivirus.

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Pbmsoultions.com Pop-up Ads

About Pbmsoultions.com Pbmsoultions.com pop-ups can not launch out of the blue. If you have actually…

6 hours ago

Remove Prizestash.com Pop-up Ads

About Prizestash.com Prizestash.com pop-ups can not expose out of the blue. If you have actually…

6 hours ago

Remove Verifiedbreaking.com Pop-up Ads

About Verifiedbreaking.com Verifiedbreaking.com pop-ups can not launch out of nowhere. If you have actually clicked…

6 hours ago

Remove Themoneyminutes.com Pop-up Ads

About Themoneyminutes.com Themoneyminutes.com pop-ups can not launch out of the blue. If you have actually…

6 hours ago

Remove News-xcidizi.com Pop-up Ads

About News-xcidizi.com News-xcidizi.com pop-ups can not introduce out of nowhere. If you have clicked some…

10 hours ago

Remove Everytraffic-flow.com Pop-up Ads

About Everytraffic-flow.com Everytraffic-flow.com pop-ups can not launch out of nowhere. If you have actually clicked…

10 hours ago