CVE-2025-1369

4.5 MEDIUM

📋 TL;DR

This critical vulnerability in MicroWord eScan Antivirus 7.0.32 on Linux allows local attackers to execute arbitrary operating system commands through the USB Password Handler component. The vulnerability requires local access to the system and successful exploitation could lead to complete system compromise. Only Linux systems running the specific antivirus version are affected.

💻 Affected Systems

Products:
  • MicroWord eScan Antivirus
Versions: 7.0.32
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the USB Password Handler component. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root privileges, allowing installation of persistent malware, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files and system resources by authenticated users with limited privileges.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring that would detect unusual command execution patterns.

🌐 Internet-Facing: LOW - The vulnerability requires local access and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Local attackers with access to the system can exploit this vulnerability to gain elevated privileges and compromise the entire system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit has been publicly disclosed but requires local access and specific conditions. The vendor has not responded to disclosure attempts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Disable USB Password Handler

linux

Disable the vulnerable USB Password Handler component to prevent exploitation

sudo systemctl stop escan-usb-protection
sudo systemctl disable escan-usb-protection

Remove or Replace Antivirus

linux

Uninstall the vulnerable eScan Antivirus version and replace with alternative security software

sudo apt remove escan-antivirus
sudo yum remove escan-antivirus

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges and prevent unauthorized local access
  • Deploy endpoint detection and response (EDR) solutions to monitor for command injection attempts and unusual process execution

🔍 How to Verify

Check if Vulnerable:

Check if eScan Antivirus version 7.0.32 is installed: rpm -qa | grep escan or dpkg -l | grep escan

Check Version:

escan --version or check package manager: rpm -qi escan-antivirus

Verify Fix Applied:

Verify the USB Password Handler service is disabled: systemctl status escan-usb-protection

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution from eScan processes
  • Suspicious system commands originating from antivirus context
  • Failed privilege escalation attempts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process.name:eScan AND (cmdline:*bash* OR cmdline:*sh* OR cmdline:*sudo*)

🔗 References

📤 Share & Export