The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Synthesis of the vulnerability 
An attacker can bypass restrictions via Interprocess Communications of Kaspersky Anti-Virus, in order to escalate his privileges.
Vulnerable software: Kaspersky AV.
Severity of this announce: 2/4.
Creation date: 26/02/2020.
Références of this computer vulnerability: CERTFR-2020-AVI-116, VIGILANCE-VUL-31681.
Description of the vulnerability 
An attacker can bypass restrictions via Interprocess Communications of Kaspersky Anti-Virus, in order to escalate his privileges. Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
This computer vulnerability bulletin impacts software or systems such as Kaspersky AV.
Our Vigil@nce team determined that the severity of this vulnerability bulletin is medium.
The trust level is of type confirmed by the editor, with an origin of user shell.
An attacker with a expert ability can exploit this threat note.
Solutions for this threat 
Kaspersky Anti-Virus: versions 2019 Patch H and 2020 Patch D.
Versions 2019 Patch H and 2020 Patch D are fixed:
https://support.kaspersky.com/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)
Computer vulnerabilities tracking service 
Vigil@nce provides a software vulnerability watch. The technology watch team tracks security threats targeting the computer system.
|