CVE Vulnerabilities for Malwarebytes
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2023‑29147 | 2023‑06‑30 21:15:09 | MEDIUM (6) | In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier. | 2 | 4 | LOCAL |
CVE‑2023‑29145 | 2023‑06‑30 20:15:09 | HIGH (8) | The Malwarebytes EDR 1.0.11 for Linux driver doesn't properly ensure whitelisting of executable libraries loaded by executable files, allowing arbitrary code execution. The attacker can set LD_LIBRARY_PATH, set LD_PRELOAD, or run an executable file in a debugger. | 2 | 6 | LOCAL |
CVE‑2023‑26088 | 2023‑03‑23 01:15:12 | HIGH (8) | In Malwarebytes before 4.5.23, a symbolic link may be used delete any arbitrary file on the system by exploiting the local quarantine system. It can also lead to privilege escalation in certain scenarios. | 2 | 6 | LOCAL |
CVE‑2020‑28641 | 2020‑12‑22 23:15:13 | HIGH (7) | In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system. | 2 | 5 | LOCAL |
CVE‑2020‑25533 | 2021‑01‑15 22:15:13 | HIGH (7) | An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct a situation where the same PID is used for running two different programs at different times, by leveraging a race condition during crafted use of posix_spawn. | 1 | 6 | LOCAL |
CVE‑2018‑5279 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5278 | 2018‑01‑08 05:29:01 | LOW (3) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 2 | 1 | LOCAL |
CVE‑2018‑5277 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5276 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5275 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E020. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5274 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5273 | 2018‑01‑08 05:29:01 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5272 | 2018‑01‑08 05:29:00 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e004. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5271 | 2018‑01‑08 05:29:00 | MEDIUM (6) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 0 | 0 | LOCAL |
CVE‑2018‑5270 | 2018‑01‑08 05:29:00 | HIGH (8) | In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e010. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit). | 2 | 6 | LOCAL |
View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.