Home

Description

Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target path. A local attacker can replace a previously scanned directory with a junction or reparse point before deletion occurs, causing the privileged process to delete an unintended system location. This may result in deletion of protected files or directories and can lead to local privilege escalation, denial of service, or system integrity compromise depending on the affected target.

PUBLISHED Reserved 2026-02-23 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

Product status

Default status
unaffected

Any version
affected

Credits

Quarkslab finder

References

blog.quarkslab.com/...alate-the-proper-way-to-use-an-av.html technical-description exploit

support.avira.com/...les/360010656158-Current-Avira-versions release-notes

www.avira.com/en/internet-security product

www.vulncheck.com/...vira-internet-security-optimizer-toctou third-party-advisory

cve.org (CVE-2026-27750)

nvd.nist.gov (CVE-2026-27750)

Download JSON