CVE-2024-7232: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Avast Free Antivirus
Avast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22963.
AI Analysis
Technical Summary
CVE-2024-7232 is a local privilege escalation vulnerability identified in Avast Free Antivirus version 23.12.6094, caused by improper link resolution before file access (CWE-59) within the Avast Service component. The vulnerability allows an attacker who already has the ability to execute low-privileged code on the system to create symbolic links that the Avast Service follows incorrectly. This improper handling enables the attacker to manipulate the service into deleting arbitrary folders, which can be leveraged to escalate privileges to SYSTEM level. The core issue is that the Avast Service does not securely validate symbolic links before performing file system operations, leading to a classic 'link following' attack. Once escalated, the attacker can execute arbitrary code with the highest system privileges, compromising confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction but does require local access with limited code execution capabilities. The CVSS v3.0 score of 7.8 reflects high severity due to the ease of exploitation after initial access and the critical impact on system security. No patches or fixes have been released at the time of this report, and no active exploitation has been observed in the wild. This vulnerability was tracked as ZDI-CAN-22963 by the Zero Day Initiative.
Potential Impact
The primary impact of CVE-2024-7232 is the potential for local attackers to escalate privileges from a low-privileged user to SYSTEM level on Windows systems running the vulnerable Avast Free Antivirus version. This escalation can lead to full system compromise, allowing attackers to install persistent malware, disable security controls, access sensitive data, or disrupt system availability. Organizations relying on Avast Free Antivirus for endpoint protection may find their defenses undermined if attackers exploit this flaw. The vulnerability is particularly dangerous in environments where users have limited privileges but can execute code, such as shared workstations, developer machines, or systems with exposed local user accounts. The absence of required user interaction and the high impact on confidentiality, integrity, and availability make this a critical concern for enterprise environments. Although no known exploits are currently active, the vulnerability’s public disclosure increases the risk of future exploitation attempts. Failure to address this vulnerability could lead to significant operational disruptions, data breaches, and compliance violations.
Mitigation Recommendations
To mitigate CVE-2024-7232, organizations should first verify if they are running the affected Avast Free Antivirus version 23.12.6094 (build 23.12.8700.813) and plan to upgrade to a patched version as soon as it becomes available from Avast. Until a patch is released, restrict local user permissions to prevent unauthorized code execution, as initial low-privileged code execution is required for exploitation. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious symbolic link creation or unusual file system operations by the Avast Service or other processes. Regularly audit and harden file system permissions to limit the ability of low-privileged users to create symbolic links in sensitive directories. Additionally, monitor logs for anomalous deletion activities or privilege escalation attempts related to Avast processes. Coordinate with Avast support or security advisories for timely updates and guidance. Finally, educate users about the risks of executing untrusted code locally to reduce the attack surface.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Brazil, India, Japan
CVE-2024-7232: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Avast Free Antivirus
Description
Avast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22963.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7232 is a local privilege escalation vulnerability identified in Avast Free Antivirus version 23.12.6094, caused by improper link resolution before file access (CWE-59) within the Avast Service component. The vulnerability allows an attacker who already has the ability to execute low-privileged code on the system to create symbolic links that the Avast Service follows incorrectly. This improper handling enables the attacker to manipulate the service into deleting arbitrary folders, which can be leveraged to escalate privileges to SYSTEM level. The core issue is that the Avast Service does not securely validate symbolic links before performing file system operations, leading to a classic 'link following' attack. Once escalated, the attacker can execute arbitrary code with the highest system privileges, compromising confidentiality, integrity, and availability of the affected system. The vulnerability does not require user interaction but does require local access with limited code execution capabilities. The CVSS v3.0 score of 7.8 reflects high severity due to the ease of exploitation after initial access and the critical impact on system security. No patches or fixes have been released at the time of this report, and no active exploitation has been observed in the wild. This vulnerability was tracked as ZDI-CAN-22963 by the Zero Day Initiative.
Potential Impact
The primary impact of CVE-2024-7232 is the potential for local attackers to escalate privileges from a low-privileged user to SYSTEM level on Windows systems running the vulnerable Avast Free Antivirus version. This escalation can lead to full system compromise, allowing attackers to install persistent malware, disable security controls, access sensitive data, or disrupt system availability. Organizations relying on Avast Free Antivirus for endpoint protection may find their defenses undermined if attackers exploit this flaw. The vulnerability is particularly dangerous in environments where users have limited privileges but can execute code, such as shared workstations, developer machines, or systems with exposed local user accounts. The absence of required user interaction and the high impact on confidentiality, integrity, and availability make this a critical concern for enterprise environments. Although no known exploits are currently active, the vulnerability’s public disclosure increases the risk of future exploitation attempts. Failure to address this vulnerability could lead to significant operational disruptions, data breaches, and compliance violations.
Mitigation Recommendations
To mitigate CVE-2024-7232, organizations should first verify if they are running the affected Avast Free Antivirus version 23.12.6094 (build 23.12.8700.813) and plan to upgrade to a patched version as soon as it becomes available from Avast. Until a patch is released, restrict local user permissions to prevent unauthorized code execution, as initial low-privileged code execution is required for exploitation. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious symbolic link creation or unusual file system operations by the Avast Service or other processes. Regularly audit and harden file system permissions to limit the ability of low-privileged users to create symbolic links in sensitive directories. Additionally, monitor logs for anomalous deletion activities or privilege escalation attempts related to Avast processes. Coordinate with Avast support or security advisories for timely updates and guidance. Finally, educate users about the risks of executing untrusted code locally to reduce the attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-07-29T20:24:25.856Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c12b7ef31ef0b55f9ac
Added to database: 2/25/2026, 9:39:30 PM
Last enriched: 2/26/2026, 3:31:29 AM
Last updated: 4/12/2026, 2:40:14 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.