CVE-2019-18194
moderate-risk
Published 2020-01-10
TotalAV 2020 4.14.31 has a quarantine flaw that allows privilege escalation. Exploitation uses an NTFS directory junction to restore a malicious DLL from quarantine into the system32 folder.
Do I need to act?
-
0.38% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://bogner.sh/2017/11/avgater-getting-local-admin-by-abusing-the-anti-virus-...
Third Party Advisory
https://bogner.sh/2017/11/avgater-getting-local-admin-by-abusing-the-anti-virus-...
37
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
8/34 · Low
Exposure
5/34 · Minimal