CVE-2023-7241

7.9 HIGH

📋 TL;DR

This vulnerability in Webroot Antivirus allows malicious software to abuse the WRSA.EXE process to delete arbitrary and protected files, potentially leading to system instability or data loss. It affects Webroot Antivirus 8.0.1X through 9.0.35.12 on both 32-bit and 64-bit Windows systems.

💻 Affected Systems

Products:
  • Webroot Antivirus
Versions: 8.0.1X through 9.0.35.12
Operating Systems: Windows 32-bit, Windows 64-bit
Default Config Vulnerable: ⚠️ Yes
Notes: All Windows systems running affected Webroot versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, rendering the operating system unbootable or causing permanent data loss.

🟠

Likely Case

Malware leveraging this vulnerability to disable security software, delete forensic evidence, or disrupt system operations by removing important files.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced, though the vulnerability still presents a significant risk.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access or malware execution on the target system. The vulnerability is in the antivirus software itself, making it particularly dangerous as it bypasses security controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.35.13 and later

Vendor Advisory: https://answers.webroot.com/Webroot/ukp.aspx?&app=vw&vw=1&login=1&solutionid=4258

Restart Required: Yes

Instructions:

1. Open Webroot SecureAnywhere. 2. Click 'Settings' > 'General'. 3. Click 'Check for Updates'. 4. If update is available, install it. 5. Restart the computer to complete the update.

🔧 Temporary Workarounds

Disable Webroot Service Temporarily

windows

Temporarily disable the Webroot service to prevent exploitation while planning for patching.

sc stop WRSA
sc config WRSA start= disabled

Restrict WRSA.EXE Permissions

windows

Apply strict file system permissions to limit what WRSA.EXE can access.

icacls "C:\Program Files\Webroot\WRSA.exe" /deny Everyone:(F)

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized execution of WRSA.EXE or similar processes.
  • Deploy additional endpoint detection and response (EDR) solutions to monitor for suspicious file deletion activities.

🔍 How to Verify

Check if Vulnerable:

Check Webroot version in the application interface or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Webroot\SecureAnywhere\Version

Check Version:

reg query "HKLM\SOFTWARE\Webroot\SecureAnywhere" /v Version

Verify Fix Applied:

Verify Webroot version is 9.0.35.13 or higher in the application or registry.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events by WRSA.EXE process
  • Multiple failed file access attempts by WRSA.EXE
  • Security software tampering alerts

Network Indicators:

  • None - this is a local privilege escalation vulnerability

SIEM Query:

Process Name="WRSA.EXE" AND (EventID=4663 OR EventID=4656) AND Object_Name="*.sys" OR Object_Name="*.dll"

🔗 References

📤 Share & Export