{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0797","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-28T14:41:56.114Z","datePublished":"2025-01-29T01:00:17.874Z","dateUpdated":"2025-02-12T19:51:16.070Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-29T01:00:17.874Z"},"title":"MicroWorld eScan Antivirus Quarantine Microworld default permission","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-276","lang":"en","description":"Incorrect Default Permissions"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"MicroWorld","product":"eScan Antivirus","versions":[{"version":"7.0.32","status":"affected"}],"modules":["Quarantine Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In MicroWorld eScan Antivirus 7.0.32 für Linux wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei /var/Microworld/ der Komponente Quarantine Handler. Dank der Manipulation mit unbekannten Daten kann eine incorrect default permissions-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:P/A:N"}}],"timeline":[{"time":"2025-01-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-28T15:47:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"FPT IS Security (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.293920","name":"VDB-293920 | MicroWorld eScan Antivirus Quarantine Microworld default permission","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.293920","name":"VDB-293920 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.484329","name":"Submit #484329 | MicroWorld Escan Antivirus on Linux 7.0.32 Incorrect Default Permissions","tags":["third-party-advisory"]},{"url":"https://github.com/dmknght/FIS_RnD/blob/main/escan_av_incorrect_default_perms_leads_to_malware_evasion.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-0797","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-01-29T14:56:04.872774Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T19:51:16.070Z"}}]}}