Avast
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Avast product.
RSS Feeds for Avast security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Avast products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Avast Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 1 vulnerability in Avast with an average score of 7.8 out of ten. Last year, in 2025 Avast had 7 security vulnerabilities published. Right now, Avast is on track to have less security vulnerabilities in 2026 than it did last year. Last year, the average CVE base score was greater by 0.16
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.80 |
| 2025 | 7 | 7.96 |
| 2024 | 13 | 6.84 |
| 2023 | 2 | 6.25 |
| 2022 | 4 | 8.10 |
| 2021 | 7 | 8.27 |
| 2020 | 7 | 5.50 |
| 2019 | 3 | 6.10 |
It may take a day or so for new Avast vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Avast Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2020-37037 | Feb 01, 2026 |
Unquoted Service Path in Avast SecureLine 5.5.522.0 Allows Local System ExecAvast SecureLine 5.5.522.0 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted path in the service configuration to inject malicious code that would execute with LocalSystem account permissions during service startup. |
|
| CVE-2025-7007 | Dec 01, 2025 |
Avast Antivirus NULL Ptr Deref CVE-2025-7007 MacOS/Linux 16.0.0/3.0.3 CrashNULL Pointer Dereference vulnerability in Avast Antivirus on MacOS, Avast Anitvirus on Linux when scanning a malformed Windows PE file causes the antivirus process to crash.This issue affects Antivirus: 16.0.0; Anitvirus: 3.0.3. |
|
| CVE-2025-3500 | Dec 01, 2025 |
Avast Antivirus 25.1.981.6 Integer Overflow Privilege EscalationInteger Overflow or Wraparound vulnerability in Avast Antivirus (25.1.981.6) on Windows allows Privilege Escalation.This issue affects Antivirus: from 25.1.981.6 before 25.3. |
|
| CVE-2025-8351 | Dec 01, 2025 |
Avast Antivirus 8.3.70.98 Heap Overflow Local Exec on macOSHeap-based Buffer Overflow, Out-of-bounds Read vulnerability in Avast Antivirus on MacOS when scanning a malformed file may allow Local Execution of Code or Denial-of-Service of the anitvirus engine process.This issue affects Antivirus: from 8.3.70.94 before 8.3.70.98. |
|
| CVE-2025-10101 | Dec 01, 2025 |
Avast Antivirus 15.7-3.9.2025 Heap OVF -> Local Exec on macOSHeap-based Buffer Overflow, Out-of-bounds Write vulnerability in Avast Antivirus on MacOS of a crafted Mach-O file may allow Local Execution of Code or Denial of Service of antivirus protection. This issue affects Antivirus: from 15.7 before 3.9.2025. |
|
| CVE-2025-13032 | Nov 11, 2025 |
Double fetch in Avast/AVG Antivirus <25.3 driver allows local privEscDouble fetch in sandbox kernel driver in Avast/AVG Antivirus <25.3 on windows allows local attacker to escalate privelages via pool overflow. |
|
| CVE-2025-10905 | Nov 11, 2025 |
Avast Free Antivirus <25.9 MiniFilter Collision Lets Admin Disable RTCollision in MiniFilter driver in Avast Software Avast Free Antivirus before 25.9 on Windows allows a local attacker with administrative privileges to disable real-time protection and self-defense mechanisms. |
|
| CVE-2024-13944 | May 09, 2025 |
Local PrivEsc via Symbolic Link in NUT Ult 24.2 (SYS Exec)Link Following Local Privilege Escalation Vulnerability in NortonUtilitiesSvc in Norton Utilities Ultimate Version 24.2.16862.6344 on Windows 10 Pro x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via the creation of a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack. |
|
| CVE-2024-7232 | Nov 22, 2024 |
Avast Free Antivirus LPE via Symbolic Link AbuseAvast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22963. |
|
| CVE-2024-7227 | Nov 22, 2024 |
Avast Free AV LPE via AvastSvc LinkFollow Symlink DeletionAvast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22272. |
|
| CVE-2024-7228 | Nov 22, 2024 |
AVST Free AV Denial-of-Service via Symbolic Link AbuseAvast Free Antivirus Link Following Denial-of-Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to create a folder. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-22806. |
|
| CVE-2024-7229 | Nov 22, 2024 |
Avast Cleanup Premium Link Follow local PrivEsc via SymlinkAvast Cleanup Premium Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Cleanup Premium. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Cleanup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22892. |
|
| CVE-2024-7230 | Nov 22, 2024 |
Avast Cleanup Premium LPE via Symbolic Link in Cleanup ServiceAvast Cleanup Premium Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Cleanup Premium. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Cleanup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22893. |
|
| CVE-2024-7231 | Nov 22, 2024 |
Avast Cleanup Premium SS LPE via Symbolic LinkAvast Cleanup Premium Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Cleanup Premium. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Cleanup Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22894. |
|
| CVE-2024-7233 | Nov 22, 2024 |
CVE-2024-7233 Avast Free Antivirus Link Following LPE via Symbolic LinkAvast Free Antivirus AvastSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23731. |
|
| CVE-2024-9484 | Oct 04, 2024 |
Null-Pointer Deref in AVG/Avast Antivirus Engine (macOS) Crash via Malformed xarAn null-pointer-derefrence in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed xar file to crash the application during file processing. |
|
| CVE-2024-9483 | Oct 04, 2024 |
AVG/Avast Antivirus: Null Deref in Sig Verify ModuleA null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing. |
|
| CVE-2024-9482 | Oct 04, 2024 |
AVAST Antivirus OOB Write Crash via Malformed Mach-O on macOSAn out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed Mach-O file to crash the application during file processing. |
|
| CVE-2024-9481 | Oct 04, 2024 |
CVE-2024-9481: Out-of-bounds Write in AVG/Avast Engine Crashes MacOSAn out-of-bounds write in the engine module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS allows a malformed eml file to crash the application during file processing. |
|
| CVE-2023-42124 | May 03, 2024 |
Avast Premium Security Sandbox Priv Escalation via Incorrect AuthAvast Premium Security Sandbox Protection Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. The issue results from incorrect authorization. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code outside the sandbox at medium integrity. . Was ZDI-CAN-20178. |
|
| CVE-2023-42125 | May 03, 2024 |
Avast Premium Security Sandbox Link Follow EscalationAvast Premium Security Sandbox Protection Link Following Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the implementation of the sandbox feature. By creating a symbolic link, an attacker can abuse the service to create arbitrary namespace objects. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. . Was ZDI-CAN-20383. |
|
| CVE-2023-5760 | Nov 08, 2023 |
AVAST/AVG Antivirus Priv Esc via IOCTL TOCTOU OOB Write (23.8)A time-of-check to time-of-use (TOCTOU) bug in handling of IOCTL (input/output control) requests. This TOCTOU bug leads to an out-of-bounds write vulnerability which can be further exploited, allowing an attacker to gain full local privilege escalation on the system.This issue affects Avast/Avg Antivirus: 23.8. |
|
| CVE-2020-20118 | Jul 11, 2023 |
Avast AntiVirus < v19.7 Buffer Overflow in aswSnx.sys DriverBuffer Overflow vulnerability in Avast AntiVirus before v.19.7 allows a local attacker to cause a denial of service via a crafted request to the aswSnx.sys driver. |
|
| CVE-2022-4291 | Dec 08, 2022 |
AVAST AV Script Shield heap corrupt before 18.0.1478The aswjsflt.dll library from Avast Antivirus windows contained a potentially exploitable heap corruption vulnerability that could enable an attacker to bypass the sandbox of the application it was loaded into, if applicable. This issue was fixed in version 18.0.1478 of the Script Shield Component. |
|
| CVE-2022-4173 | Dec 06, 2022 |
Avast/AVG Malware Removal Priv Esc v22.10 VulnerabilityA vulnerability within the malware removal functionality of Avast and AVG Antivirus allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avast and AVG Antivirus version 22.10. |
|
| CVE-2022-28965 | May 20, 2022 |
Multiple DLL hijacking vulnerabilities via the components instup.exe and wsc_proxy.exe in Avast Premium Security before v21.11.2500Multiple DLL hijacking vulnerabilities via the components instup.exe and wsc_proxy.exe in Avast Premium Security before v21.11.2500 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted DLL file. |
|
| CVE-2022-28964 | May 20, 2022 |
An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528)An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file. |
|
| CVE-2021-45339 | Dec 27, 2021 |
Privilege escalation vulnerability in Avast Antivirus prior to 20.4Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by "hollowing" trusted process which could lead to the bypassing of Avast self-defense. |
|
| CVE-2021-45338 | Dec 27, 2021 |
Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security. |
|
| CVE-2021-45337 | Dec 27, 2021 |
Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by "hollowing" process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection. |
|
| CVE-2021-45336 | Dec 27, 2021 |
Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges. |
|
| CVE-2021-45335 | Dec 27, 2021 |
Sandbox component in Avast Antivirus prior to 20.4 has an insecure permissionSandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files. |
|
| CVE-2020-23907 | Apr 21, 2021 |
An issue was discovered in retdec v3.3An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. |
|
| CVE-2021-27241 | Mar 29, 2021 |
This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561)This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082. |
|
| CVE-2020-15024 | Sep 10, 2020 |
An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562. An entered password continues to be stored in Windows main memory after a logout, and after a Lock Vault operation. |
|
| CVE-2020-13657 | Jun 29, 2020 |
An elevation of privilege vulnerability exists in Avast Free Antivirus and AVG AntiVirus Free before 20.4 due to improperly handling hard linksAn elevation of privilege vulnerability exists in Avast Free Antivirus and AVG AntiVirus Free before 20.4 due to improperly handling hard links. The vulnerability allows local users to take control of arbitrary files. |
|
| CVE-2020-8987 | Mar 09, 2020 |
Avast AntiTrack before 1.5.1.172 and AVG Antitrack before 2.0.0.178 proxies traffic to HTTPS sites but does not validate certificates, and thus a man-in-the-middleAvast AntiTrack before 1.5.1.172 and AVG Antitrack before 2.0.0.178 proxies traffic to HTTPS sites but does not validate certificates, and thus a man-in-the-middle can host a malicious website using a self-signed certificate. No special action necessary by the victim using AntiTrack with "Allow filtering of HTTPS traffic for tracking detection" enabled. (This is the default configuration.) |
|
| CVE-2020-9399 | Feb 28, 2020 |
The Avast AV parsing engine allows virus-detection bypass via a crafted ZIP archiveThe Avast AV parsing engine allows virus-detection bypass via a crafted ZIP archive. This affects versions before 12 definitions 200114-0 of Antivirus Pro, Antivirus Pro Plus, and Antivirus for Linux. |
And others... |
| CVE-2019-17190 | Jan 27, 2020 |
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the elevated process cleans the ACL of the Update.ini file in %PROGRAMDATA%\Avast Software\Browser\Update\ and sets all privileges to group Everyone. Because any low-privileged user can create, delete, or modify the Update.ini file stored in this location, an attacker with low privileges can create a hard link named Update.ini in this folder, and make it point to a file writable by NT AUTHORITY\SYSTEM. Once AvastBrowserUpdate.exe is triggered by the update check functionality, the DACL is set to a misconfigured value on the crafted Update.ini and, consequently, to the target file that was previously not writable by the low-privileged attacker. |
|
| CVE-2019-18894 | Jan 13, 2020 |
In Avast Premium Security 19.8.2393, attackersIn Avast Premium Security 19.8.2393, attackers can send a specially crafted request to the local web server run by Avast Antivirus on port 27275 to support Bank Mode functionality. A flaw in the processing of a command allows execution of arbitrary OS commands with the privileges of the currently logged in user. This allows for example attackers who compromised a browser extension to escape from the browser sandbox. |
|
| CVE-2019-18893 | Jan 13, 2020 |
XSS in the Video Downloader component before 1.5 of Avast Secure Browser 77.1.1831.91 and AVG Secure Browser 77.0.1790.77XSS in the Video Downloader component before 1.5 of Avast Secure Browser 77.1.1831.91 and AVG Secure Browser 77.0.1790.77 allows websites to execute their code in the context of this component. While Video Downloader is technically a browser extension, it is granted a very wide set of privileges and can for example access cookies and browsing history, spy on the user while they are surfing the web, and alter their surfing experience in almost arbitrary ways. |
|
| CVE-2019-17093 | Oct 23, 2019 |
An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0. |
|
| CVE-2019-11230 | Jul 18, 2019 |
In Avast Antivirus before 19.4, a local administratorIn Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart. |
|
| CVE-2018-12572 | Mar 21, 2019 |
Avast Free Antivirus prior to 19.1.2360 stores user credentials in memory upon login, whichAvast Free Antivirus prior to 19.1.2360 stores user credentials in memory upon login, which allows local users to obtain sensitive information by dumping AvastUI.exe application memory and parsing the data. |
|
| CVE-2015-8620 | Apr 13, 2016 |
Heap-based buffer overflow in the Avast virtualization driver (aswSnx.sys) in Avast Internet Security, Pro Antivirus, Premier, and Free Antivirus before 11.1.2253Heap-based buffer overflow in the Avast virtualization driver (aswSnx.sys) in Avast Internet Security, Pro Antivirus, Premier, and Free Antivirus before 11.1.2253 allows local users to gain privileges via a Unicode file path in an IOCTL request. |
And others... |
| CVE-2010-5151 | Aug 25, 2012 |
Race condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous codeRace condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute |
|