Home

Description

Avira Internet Security contains an improper link resolution vulnerability in the Software Updater component. During the update process, a privileged service running as SYSTEM deletes a file under C:\\ProgramData without validating whether the path resolves through a symbolic link or reparse point. A local attacker can create a malicious link to redirect the delete operation to an arbitrary file, resulting in deletion of attacker-chosen files with SYSTEM privileges. This may lead to local privilege escalation, denial of service, or system integrity compromise depending on the targeted file and operating system configuration.

PUBLISHED Reserved 2026-02-23 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-59 Improper Link Resolution Before File Access ('Link Following')

Product status

Default status
unaffected

Any version
affected

1.1.114.3113 (semver)
unaffected

Credits

Quarkslab finder

References

blog.quarkslab.com/...alate-the-proper-way-to-use-an-av.html technical-description exploit

support.avira.com/...les/360010656158-Current-Avira-versions release-notes

www.avira.com/en/internet-security product

www.vulncheck.com/...e-deletion-via-improper-link-resolution third-party-advisory

cve.org (CVE-2026-27748)

nvd.nist.gov (CVE-2026-27748)

Download JSON