CVE-2023-42125

Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-20383.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:avast:premium_security:22.12.6044:*:*:*:*:*:*:*

History

13 Aug 2025, 12:12

Type Values Removed Values Added
First Time Avast
Avast premium Security
CPE cpe:2.3:a:avast:premium_security:22.12.6044:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1475/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1475/ - Third Party Advisory
CWE CWE-59

18 Sep 2024, 19:15

Type Values Removed Values Added
Summary Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-20383. Avast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-20383.

03 May 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:15

Updated : 2025-08-13 12:12


NVD link : CVE-2023-42125

Mitre link : CVE-2023-42125


JSON object : View

Products Affected

avast

  • premium_security
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')