U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-32176

Change History

New CVE Received from Zero Day Initiative 5/02/2024 10:15:23 PM

Action Type Old Value New Value
Added Description

								
							
							
						
VIPRE Antivirus Plus SetPrivateConfig Directory Traversal  Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Antivirus Plus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the SetPrivateConfig method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-19394.
Added CVSS V3

								
							
							
						
Zero Day Initiative AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
Zero Day Initiative CWE-22
Added Reference

								
							
							
						
Zero Day Initiative https://success.vipre.com/en_US/antivirus-plus-release-notes/home-plus-release-notes-20230530 [No types assigned]
Added Reference

								
							
							
						
Zero Day Initiative https://www.zerodayinitiative.com/advisories/ZDI-23-756/ [No types assigned]