The Tenable expert David Wells discovered five flaws in the Comodo Antivirus and Comodo Antivirus Advanced.
Four of the vulnerabilities affect were version 184.108.40.20610 and one the version 220.127.116.1182.
The most severe flaw, tracked as CVE=2019-3969, could be exploited by an attacker with access to the target system to escape the Comodo Antivirus sandbox and escalate privileges to SYSTEM.
“An attacker can bypass this
Another vulnerability, tracked as, CVE-2019-3970, is an arbitrary file write issue that could be’ exploited by an attacker to modify malware definitions and evade detection.
The remaining issue could be exploited by an attacker with access to the target system to trigger a
Wells published technical details for the sandbox escape/privilege escalation vulnerability in a post published on Medium.
Wells also published a Proof-of-concept exploit code on GitHub and a video PoC for the flaw.
Tenable reported the flaws to Comodo in April, but at the time of writing the vendor has yet to address them.
“At the time of this disclosure, we are not aware of any patches released by Comodo that address these vulnerabilities. We recommend to keep updated on future Comodo Antivirus releases.” concludes Tenable.
Below the timeline for the flaw:
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.