Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7230: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Avast Cleanup Premium

0
High
VulnerabilityCVE-2024-7230cvecve-2024-7230cwe-59
Published: Fri Nov 22 2024 (11/22/2024, 21:11:40 UTC)
Source: CVE Database V5
Vendor/Project: Avast
Product: Cleanup Premium

Description

CVE-2024-7230 is a high-severity local privilege escalation vulnerability in Avast Cleanup Premium version 23. 4 (build 15592). It arises from improper link resolution before file access (CWE-59) in the Avast Cleanup Service. An attacker with low-privileged code execution can create a symbolic link to trick the service into deleting arbitrary files, enabling escalation to SYSTEM privileges. Exploitation requires local access and no user interaction, but no known exploits are currently in the wild. This vulnerability impacts confidentiality, integrity, and availability by allowing full system control. Organizations using Avast Cleanup Premium on Windows systems are at risk, especially where local user accounts are less restricted. Mitigation involves applying patches once available, restricting local user permissions, and monitoring for suspicious symbolic link creation. Countries with high Avast market penetration and significant Windows desktop usage, such as the United States, Germany, United Kingdom, and others, are most likely affected. The CVSS score of 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:30:58 UTC

Technical Analysis

CVE-2024-7230 is a local privilege escalation vulnerability identified in Avast Cleanup Premium version 23.4 (build 15592). The root cause is improper link resolution before file access (CWE-59) within the Avast Cleanup Service. Specifically, the service fails to securely handle symbolic links, allowing a local attacker who already has the ability to execute low-privileged code to create a symbolic link that points to a sensitive file. When the service processes this link, it inadvertently deletes or modifies files it should not, enabling the attacker to escalate privileges to SYSTEM level. This flaw leverages the service's higher privilege context to perform unauthorized file operations. Exploitation does not require user interaction but does require local access and some initial code execution capability at a low privilege level. The vulnerability was reported by the Zero Day Initiative (ZDI) and assigned CVE-2024-7230 with a CVSS v3.0 score of 7.8, indicating a high severity. No public exploits have been observed in the wild yet. The vulnerability affects confidentiality, integrity, and availability because an attacker gaining SYSTEM privileges can fully control the affected system, access sensitive data, and disrupt operations. The vulnerability is specific to Windows environments where Avast Cleanup Premium is installed and running. The absence of patches at the time of reporting means users must rely on interim mitigations until official updates are released.

Potential Impact

This vulnerability allows an attacker with limited local access to escalate privileges to SYSTEM, effectively gaining full control over the affected machine. The impact is severe as it compromises confidentiality, integrity, and availability of the system. Attackers can execute arbitrary code with the highest privileges, potentially installing persistent malware, stealing sensitive information, or disrupting system operations. Organizations relying on Avast Cleanup Premium in environments where users have local accounts with some execution capabilities are at risk. This can lead to lateral movement within networks, data breaches, and operational downtime. The vulnerability is particularly concerning in enterprise and government environments where privileged access controls are critical. Although no known exploits are currently in the wild, the existence of a reliable local privilege escalation path makes this a high-priority issue for defenders to address proactively.

Mitigation Recommendations

1. Apply official patches from Avast as soon as they are released to address this vulnerability directly. 2. Until patches are available, restrict local user permissions to prevent untrusted users from executing code or creating symbolic links. 3. Implement application whitelisting to limit execution of unauthorized binaries or scripts. 4. Monitor file system activity for suspicious symbolic link creation or deletion operations, especially targeting Avast Cleanup Service files. 5. Use endpoint detection and response (EDR) tools to detect anomalous behavior indicative of privilege escalation attempts. 6. Harden local accounts by enforcing least privilege principles and disabling unnecessary local accounts. 7. Educate users about the risks of running untrusted code locally. 8. Consider temporarily disabling or uninstalling Avast Cleanup Premium in high-risk environments until a patch is applied. 9. Review and tighten group policies related to symbolic link creation and file system permissions where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-07-29T20:23:50.921Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c12b7ef31ef0b55f9a6

Added to database: 2/25/2026, 9:39:30 PM

Last enriched: 2/26/2026, 3:30:58 AM

Last updated: 2/26/2026, 6:13:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats