Vulnerability Description
In K7 Ultimate Security 16.0.0117, the module K7BKCExt.dll (aka the backup module) improperly validates the administrative privileges of the user, allowing an arbitrary file write via a symbolic link attack with file restoration functionality.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| K7Computing | K7 Ultimate Security | 16.0.0117 |
Related Weaknesses (CWE)
References
- https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20SecuriExploitThird Party Advisory
- https://support.k7computing.com/index.php?/selfhelp/categories/Vulnerability%20RVendor Advisory
- https://github.com/NtRaiseHardError/Antimalware-Research/blob/master/K7%20SecuriExploitThird Party Advisory
- https://support.k7computing.com/index.php?/selfhelp/categories/Vulnerability%20RVendor Advisory
FAQ
What is CVE-2019-16896?
CVE-2019-16896 is a vulnerability with a CVSS score of 7.8 (HIGH). In K7 Ultimate Security 16.0.0117, the module K7BKCExt.dll (aka the backup module) improperly validates the administrative privileges of the user, allowing an arbitrary file write via a symbolic link ...
How severe is CVE-2019-16896?
CVE-2019-16896 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16896?
Check the references section above for vendor advisories and patch information. Affected products include: K7Computing K7 Ultimate Security.