CVE-2025-1364

A vulnerability has been found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this vulnerability is the function passPrompt of the component USB Protection Service. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.295969 Permissions Required VDB Entry
https://vuldb.com/?id.295969 Third Party Advisory VDB Entry
https://vuldb.com/?submit.496481 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*

History

No history.

Information

Published : 2025-02-16 23:15

Updated : 2025-10-10 15:05


NVD link : CVE-2025-1364

Mitre link : CVE-2025-1364

CVE.ORG link : CVE-2025-1364


JSON object : View

Products Affected

escanav

  • escan_anti-virus
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow