{"id":71,"date":"2020-04-24T10:24:06","date_gmt":"2020-04-24T10:24:06","guid":{"rendered":"http:\/\/labs.redyops.com\/?p=71"},"modified":"2020-07-14T12:08:22","modified_gmt":"2020-07-14T12:08:22","slug":"bitdefender-antivirus-free-escalation-of-privileges","status":"publish","type":"post","link":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/","title":{"rendered":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )"},"content":{"rendered":"<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\" data-a2a-title=\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h1>\n\n\n\n<p><strong>Assigned CVE<\/strong>: CVE-2020-8103 has been assigned and RedyOps Labs has been publicly acknowledged by the vendor.<\/p>\n\n\n\n<p><strong>Known to Neurosoft\u2019s RedyOps Labs since<\/strong>: 18\/03\/2020<\/p>\n\n\n\n<p><strong>Exploit<\/strong>&nbsp;<strong>Code<\/strong>:&nbsp;<a href=\"https:\/\/github.com\/RedyOpsResearchLabs\/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/RedyOpsResearchLabs\/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP <\/a><\/p>\n\n\n\n<p><strong>Vendor\u2019s Advisory<\/strong>:&nbsp;<a href=\"https:\/\/www.bitdefender.com\/support\/security-advisories\/link-resolution-privilege-escalation-vulnerability-bitdefender-antivirus-free-va-8604\/\">https:\/\/www.bitdefender.com\/support\/security-advisories\/link-resolution-privilege-escalation-vulnerability-bitdefender-antivirus-free-va-8604\/<\/a><\/p>\n\n\n\n<p>An Elevation of Privileges (EoP) exists in Bitdefender Antivirus Free 2020 &lt; 1.0.17.178 . The latest version we tested is  BitDefender Free Edition 1.0.17.169. The exploitation of this EoP,  gives the ability to a low privileged user to gain access as NT AUTHORITY\\SYSTEM . The exploitation has been tested in installation of BitDefender on Windows 10 1909 (OS Build 18363.720) 64bit .<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Description<\/strong><\/h1>\n\n\n\n<p>The exploitation allows any local, low privileged user, to change the Discretionary Access Control List (DACL) of any chosen file. The access you obtain depends on which file you are going to backdoor\/overwrite. In the Proof of Concept (PoC) we overwrite the file system32\/wermgr.exe and we pop a cmd.exe running as NT AUTHORITY\\SYSTEM . The exploitation works with the default installation of BitDefender. When the BitDefender detects a threat, it gives the ability to the user to choose what action to take. The user can choose to Quarantine the threat. After the threat has been placed in Quarantine, the user can choose to restore it. The problem arises because the BitDefeder restores the file as NT AUTHORITY\\SYSTEM and without impersonating the current user. This allows the user to create a symlink and restore the file to an arbitrary location or overwrite files which are running as SYSTEM.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Exploitation<\/strong><\/h1>\n\n\n\n<ol><li>Put an EICAR file (or any other file which can be detected as a threat) under an empty folder which you fully control.  For example, put an EICAR file to C:\\Users\\Public\\Music<\/li><li>Scan the EICAR file (e.g C:\\Users\\Public\\Music\\eicar.txt) with the BitDefender.<\/li><li>When the BitDefender detects the threat, choose to Quarantine the file.<\/li><li>Give some time to the BitDefender and rename the folder C:\\Users\\Public\\Music to C:\\Users\\Public\\Music2 .<\/li><li>Create the symlink C:\\Users\\Public\\Music\\eicar.txt (e.g with the CreateSymlink.exe from symboliclink-testing-tools of project zero) and target the file you wish to control. For example CreateSymlink.exe C:\\Users\\Public\\Music\\eicar.txt c:\\windows\\system32\\wermgr.exe .<\/li><li>Add the c:\\windows\\system32\\wermgr.exe to the exception list of BitDefender.<\/li><li>Go back to BitDefender and restore the C:\\Users\\Public\\Music\\eicar.txt . The first time it may fail. Click restore again.<\/li><li>The BitDefender, running as NT AUTHORITY\\SYSTEM, will follow the symlink and will overwrite the file c:\\windows\\system32\\wermgr.exe .<\/li><li>The c:\\windows\\system32\\wermgr.exe will have a new DACL, which gives  your user full access. You can overwrite the file with anything you wish.<\/li><\/ol>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video PoC Step By Step<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"BitDefender EoP\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/UduCLXxIFCo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The exploit takes 2 arguments. The second argument is the file we want to overwrite. The first argument, is the file with which we want to overwrite it. As for example the execution:<\/p>\n\n\n\n<p>Exploit.exe C:\\users\\attacker\\Desktop\\1.exe c:\\windows\\system32\\wermgr.exe<\/p>\n\n\n\n<p>will overwrite the file c:\\windows\\system32\\wermgr.exe with the file C:\\users\\attacker\\Desktop\\1.exe . <\/p>\n\n\n\n<p>The 1.exe is irrelevant to the exploitation. You can choose any file you wish and you can override any file you like. the 1.exe will just execute the cmd.exe to the current user&#8217;s session. For example you can execute<\/p>\n\n\n\n<p>Exploit.exe C:\\users\\attacker\\Desktop\\test.txt c:\\windows\\system32\\wermgr.exe<\/p>\n\n\n\n<p>and you will overwrite the c:\\windows\\system32\\wermgr.exe with the file C:\\users\\attacker\\Desktop\\test.txt<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>00:00 &#8211; 00:56: I present the environment. The low privilege user, the windows version, the BitDefender version and the DACL of the file c:\\windows\\system32\\wermgr.exe . As we can see the user attacker has limited access to the file.<\/p>\n\n\n\n<p>00:56 &#8211; 01:54: We run the exploit and the first thing we have to do is to add as an exception the file we target. In this case the file c:\\windows\\system32\\wermgr.exe<\/p>\n\n\n\n<p>01:54 &#8211; 02:48: After we add the exception, we go back to the exploit and we press ENTER. After the ENTER button is pressed, the exploit should print three lines which inform us about the AV. At this point, the exploit has created the EICAR file under the C:\\Users\\Public\\Music\\ folder. We go to this folder and we scan the file. We opt to move it to the Quarantine. Until this point, there is no reason for the exploit to fail. It just creates the EICAR file. If you do not see the three lines which are presented in the video and inform you about the AV, ensure you have pressed the ENTER a few times.<\/p>\n\n\n\n<p>02:48 &#8211; 03:49: At this point the exploit checks that the EICAR file has been removed. In 30&#8243; more or less you should see the message &#8220;I go for a coffee. Give me a sec.&#8221; . If for some reason you don&#8217;t see the message after a few seconds, press ENTER a few times inside the Exploit window. After this message, the Exploit renames the folder C:\\Users\\Public\\Music to C:\\Users\\Public\\Music2 and there is a sleep for 50&#8243; . If you don&#8217;t see the second message &#8220;I am back. Oh no the bell. BRB.&#8221; after 50&#8243; &#8211; 60&#8243; just press ENTER again in the exploit window.<\/p>\n\n\n\n<p>03:49 &#8211; 04:00: After the message &#8220;I am back. Oh no the bell. BRB.&#8221; the exploit creates the Symlink. It will create the symlink C:\\Users\\Public\\Music\\RESTORE_ME__* * *.txt which targets the c:\\windows\\system32\\wermgr.exe . Then the exploit instructs us to restore the file.<\/p>\n\n\n\n<p>04:00 &#8211; 04:20: We go back to the BitDefender and we restore the file. As we observe, we have to press the restore button two times. The BitDefender will restore the eicar file and will overwrite the c:\\windows\\system32\\wermgr.exe . The c:\\windows\\system32\\wermgr.exe will have a new DACL which allows us to overwrite it. The exploit will overwrite the c:\\windows\\system32\\wermgr.exe with our binary &#8220;1.exe&#8221; . At this point the exploit should terminate in a few seconds. If you observe a delay on the exploit, press ENTER a few times.<\/p>\n\n\n\n<p>04:20 &#8211; end: This is irrelevant with the BitDefender issue. This is just a way to trigger the execution of the file c:\\windows\\system32\\wermgr.exe (which is now the 1.exe) as SYSTEM and gain a shell as NT AUTHORITY\\SYSTEM . As we can see the c:\\windows\\system32\\wermgr.exe has been ovewritten by the 1.exe and the new DACL gives the &#8220;attacker&#8221; full access over the file.<\/p>\n\n\n<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\" data-a2a-title=\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F24%2Fbitdefender-antivirus-free-escalation-of-privileges%2F&amp;linkname=BitDefender%20Antivirus%20Free%202020%20Elevation%20of%20Privilege%20%28CVE-2020-8103%20%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Resources<\/strong><\/h1>\n\n\n\n<p><strong>GitHub<\/strong><\/p>\n\n\n\n<p>You can find the exploit code in our Github at&nbsp;<a href=\"https:\/\/github.com\/RedyOpsResearchLabs\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/RedyOpsResearchLabs\/<\/a><\/p>\n\n\n\n<p><strong>RedyOps team<\/strong><\/p>\n\n\n\n<p>RedyOps team, uses the 0-day exploits produced by Research Labs, before vendor releases any patch. They use it in special engagements and only for specific customers.<\/p>\n\n\n\n<p>You can find RedyOps team at&nbsp;<a href=\"https:\/\/redyops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/redyops.com\/<\/a><\/p>\n\n\n\n<p><strong>Angel<\/strong><\/p>\n\n\n\n<p>Discovered 0-days which affect marine sector, are being contacted with the Angel Team. ANGEL has been designed and developed to meet the unique and diverse requirements of the merchant marine sector. It secures the vessel\u2019s business, IoT and crew networks by providing oversight, security threat alerting and control of the vessel\u2019s entire network.<\/p>\n\n\n\n<p>You can find Angel team at&nbsp;<a href=\"https:\/\/angelcyber.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/angelcyber.gr\/<\/a><\/p>\n\n\n\n<p><strong>Illicium<\/strong><\/p>\n\n\n\n<p>Our 0-days cannot win Illicium. Today\u2019s information technology landscape is threatened by modern adversary security attacks, including 0-day exploits, polymorphic malwares, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers\u2019 evolution, defenders now have a new kind of weapon in their arsenal: Deception.<\/p>\n\n\n\n<p>You can find Illicium team at&nbsp;<a href=\"https:\/\/deceivewithillicium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/deceivewithillicium.com\/<\/a><\/p>\n\n\n\n<p><strong>Neutrify<\/strong><\/p>\n\n\n\n<p>Discovered 0-days are being contacted to the Neutrify team, in order to develop related detection rules. Neutrify is Neurosoft\u2019s 24\u00d77 Security Operations Center, completely dedicated to threats monitoring and attacks detection. Beyond just monitoring, Neutrify offers additional capabilities including advanced forensic analysis and malware reverse engineering to analyze incidents.<\/p>\n\n\n\n<p>You can find Neutrify team at&nbsp;<a href=\"https:\/\/neurosoft.gr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/neurosoft.gr\/contact\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Assigned CVE: CVE-2020-8103 has been assigned and RedyOps Labs has been publicly acknowledged by the vendor. Known to Neurosoft\u2019s RedyOps Labs since: 18\/03\/2020 Exploit&nbsp;Code:&nbsp;https:\/\/github.com\/RedyOpsResearchLabs\/-CVE-2020-8103-Bitdefender-Antivirus-Free-EoP Vendor\u2019s Advisory:&nbsp;https:\/\/www.bitdefender.com\/support\/security-advisories\/link-resolution-privilege-escalation-vulnerability-bitdefender-antivirus-free-va-8604\/ An Elevation of Privileges (EoP) exists in Bitdefender Antivirus Free 2020 &lt; 1.0.17.178 . The latest version we tested is BitDefender Free Edition 1.0.17.169. The exploitation of this &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,4],"tags":[2,22,3],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs<\/title>\n<meta name=\"description\" content=\"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs\" \/>\n<meta property=\"og:description\" content=\"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\" \/>\n<meta property=\"og:site_name\" content=\"REDYOPS Labs\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-24T10:24:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-14T12:08:22+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )\" \/>\n<meta name=\"twitter:description\" content=\"Exploit code and write-up for BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/04\/bitdefender.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\",\"url\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\",\"name\":\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs\",\"isPartOf\":{\"@id\":\"https:\/\/labs.redyops.com\/#website\"},\"datePublished\":\"2020-04-24T10:24:06+00:00\",\"dateModified\":\"2020-07-14T12:08:22+00:00\",\"author\":{\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\"},\"description\":\"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.\",\"breadcrumb\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/labs.redyops.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/labs.redyops.com\/#website\",\"url\":\"https:\/\/labs.redyops.com\/\",\"name\":\"REDYOPS Labs\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/labs.redyops.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/labs.redyops.com\"],\"url\":\"https:\/\/labs.redyops.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs","description":"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/","og_locale":"en_US","og_type":"article","og_title":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs","og_description":"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.","og_url":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/","og_site_name":"REDYOPS Labs","article_published_time":"2020-04-24T10:24:06+00:00","article_modified_time":"2020-07-14T12:08:22+00:00","author":"admin","twitter_card":"summary_large_image","twitter_title":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )","twitter_description":"Exploit code and write-up for BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )","twitter_image":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/04\/bitdefender.png","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/","url":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/","name":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) - REDYOPS Labs","isPartOf":{"@id":"https:\/\/labs.redyops.com\/#website"},"datePublished":"2020-04-24T10:24:06+00:00","dateModified":"2020-07-14T12:08:22+00:00","author":{"@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69"},"description":"Bitdefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 ) exploit code and writeup.","breadcrumb":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/24\/bitdefender-antivirus-free-escalation-of-privileges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/labs.redyops.com\/"},{"@type":"ListItem","position":2,"name":"BitDefender Antivirus Free 2020 Elevation of Privilege (CVE-2020-8103 )"}]},{"@type":"WebSite","@id":"https:\/\/labs.redyops.com\/#website","url":"https:\/\/labs.redyops.com\/","name":"REDYOPS Labs","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/labs.redyops.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/labs.redyops.com"],"url":"https:\/\/labs.redyops.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/71"}],"collection":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":24,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/71\/revisions"}],"predecessor-version":[{"id":235,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/71\/revisions\/235"}],"wp:attachment":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/media?parent=71"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/categories?post=71"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/tags?post=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}