CVE-2021-45337
📋 TL;DR
A privilege escalation vulnerability in Avast Antivirus's Self-Defense driver allows local users with SYSTEM privileges to gain elevated privileges by hollowing the wsc_proxy.exe process. This could lead to acquiring antimalware protected process light (AM-PPL) protection, bypassing security controls. Affects Avast Antivirus users with versions prior to 20.8.
💻 Affected Systems
- Avast Antivirus
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with SYSTEM privileges could gain full control over the antimalware protection, disable security features, and execute arbitrary code with highest privileges.
Likely Case
Malicious local users or malware with SYSTEM access could escalate privileges to bypass antivirus protections and maintain persistence.
If Mitigated
With proper patch management and least privilege principles, impact is limited to systems where attackers already have SYSTEM access.
🎯 Exploit Status
Exploitation requires SYSTEM privileges and involves process hollowing techniques. Public disclosure includes technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 20.8 and later
Vendor Advisory: https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0
Restart Required: Yes
Instructions:
1. Open Avast Antivirus. 2. Navigate to Settings > Update. 3. Click 'Update' to download latest version. 4. Restart computer when prompted.
🔧 Temporary Workarounds
Disable Self-Defense (Not Recommended)
windowsTemporarily disable Self-Defense feature to mitigate vulnerability, but reduces security.
Right-click Avast tray icon > Avast shields control > Disable until computer is restarted
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from obtaining SYSTEM privileges
- Monitor for suspicious process hollowing activity targeting wsc_proxy.exe
🔍 How to Verify
Check if Vulnerable:
Check Avast version: Open Avast > Menu > About. If version is below 20.8, system is vulnerable.
Check Version:
wmic product where "name like 'Avast%'" get version
Verify Fix Applied:
Verify Avast version is 20.8 or higher and check that Self-Defense feature is functioning normally.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation/modification of wsc_proxy.exe
- Avast Self-Defense driver access violations
Network Indicators:
- None - local exploitation only
SIEM Query:
Process Creation where (Image contains 'wsc_proxy.exe' AND ParentImage contains unusual process) OR (Process Hollowing detection events)
🔗 References
- https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5
- https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0
- https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST3%20%26%20CVE-2021-AVST4%20%26%20CVE-2021-AVST5
- https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0