Home

Description

Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM.

PUBLISHED Reserved 2026-02-23 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Default status
unaffected

Any version
affected

1.1.114.3113
unaffected

Credits

Quarkslab finder

References

blog.quarkslab.com/...alate-the-proper-way-to-use-an-av.html technical-description exploit

support.avira.com/...les/360010656158-Current-Avira-versions release-notes

www.avira.com/en/internet-security product

www.vulncheck.com/...system-speedup-insecure-deserialization third-party-advisory

cve.org (CVE-2026-27749)

nvd.nist.gov (CVE-2026-27749)

Download JSON