CVE-2023-42125

7.8 HIGH

📋 TL;DR

This vulnerability in Avast Premium Security allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM-level access by exploiting a symbolic link flaw in the sandbox protection feature. Attackers must first gain initial access to execute low-privileged code on the target system. Only Avast Premium Security installations with the sandbox feature enabled are affected.

💻 Affected Systems

Products:
  • Avast Premium Security
Versions: Versions prior to the fix (specific version numbers not provided in available references)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires sandbox protection feature to be enabled. The vulnerability exists in the sandbox implementation specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM-level privileges, enabling attackers to install persistent malware, disable security controls, access all user data, and pivot to other systems on the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, and maintain persistence on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint security controls, least privilege principles, and network segmentation are implemented to prevent initial low-privileged access.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access; it cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial foothold on a system (via phishing, malware, etc.), this vulnerability enables privilege escalation to SYSTEM, posing significant internal network risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute low-privileged code first. Symbolic link manipulation requires specific timing and conditions but is well-understood technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references, but Avast has released updates addressing ZDI-CAN-20383

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-23-1475/

Restart Required: Yes

Instructions:

1. Open Avast Premium Security 2. Navigate to Settings > Update 3. Click 'Update' to download and install latest version 4. Restart computer when prompted

🔧 Temporary Workarounds

Disable Sandbox Protection

windows

Temporarily disable the vulnerable sandbox feature until patching can be completed

Open Avast Premium Security > Settings > Protection > Core Shields > Sandbox > Toggle off

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit initial low-privileged access opportunities
  • Deploy application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check Avast Premium Security version and ensure it's updated to latest version. Check if sandbox protection is enabled in settings.

Check Version:

Open Avast Premium Security > Menu > About

Verify Fix Applied:

Verify Avast Premium Security is updated to latest version and restart has been completed. Confirm no privilege escalation attempts succeed in testing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual symbolic link creation events in Windows security logs
  • Avast service privilege escalation attempts
  • Unexpected SYSTEM-level process creation from user accounts

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

Windows Security Event ID 4688 with Parent Process containing 'avast' and New Process running as SYSTEM from non-privileged user context

🔗 References

📤 Share & Export