Avira
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Avira product.
RSS Feeds for Avira security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Avira products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Avira Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 3 vulnerabilities in Avira with an average score of 7.8 out of ten. Avira did not have any published security vulnerabilities last year. That is, 3 more vulnerabilities have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 3 | 7.80 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 0.00 |
| 2023 | 4 | 6.25 |
| 2022 | 2 | 7.65 |
| 2021 | 0 | 0.00 |
| 2020 | 5 | 0.00 |
| 2019 | 2 | 0.00 |
It may take a day or so for new Avira vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Avira Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-27748 | Mar 05, 2026 |
Avira inetSec SoftwareUpdater link resolution deletion pre-v1.1.114Avira Internet Security contains an improper link resolution vulnerability in the Software Updater component. During the update process, a privileged service running as SYSTEM deletes a file under C:\\ProgramData without validating whether the path resolves through a symbolic link or reparse point. A local attacker can create a malicious link to redirect the delete operation to an arbitrary file, resulting in deletion of attacker-chosen files with SYSTEM privileges. This may lead to local privilege escalation, denial of service, or system integrity compromise depending on the targeted file and operating system configuration. |
|
| CVE-2026-27749 | Mar 05, 2026 |
Avira Internet Security <=1.1.109.1990 Deserialization in System Speedup RTO.exeAvira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM. |
|
| CVE-2026-27750 | Mar 05, 2026 |
Avira Internet Security 1.1.109.1990 TOCTOU Privilege EscalationAvira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target path. A local attacker can replace a previously scanned directory with a junction or reparse point before deletion occurs, causing the privileged process to delete an unintended system location. This may result in deletion of protected files or directories and can lead to local privilege escalation, denial of service, or system integrity compromise depending on the affected target. |
|
| CVE-2023-51636 | May 22, 2024 |
Avira Prime LPE via Symlink Abuse in Spotlight ServiceAvira Prime Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avira Prime. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avira Spotlight Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21600. |
|
| CVE-2023-36673 | Aug 09, 2023 |
Avira Phantom VPN <=2.23.1 macOS ServerIP Leak: Plaintext Traffic to VPN IPAn issue was discovered in Avira Phantom VPN through 2.23.1 for macOS. The VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel, even if this traffic is not generated by the VPN client, while simultaneously using plaintext DNS to look up the VPN server's IP address. This allows an adversary to trick the victim into sending traffic to arbitrary IP addresses in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "ServerIP attack, combined with DNS spoofing, that can leak traffic to an arbitrary IP address" rather than to only Avira Phantom VPN. |
|
| CVE-2023-1900 | Apr 19, 2023 |
Avira EndpointPro Heap Overflow DDoS (fixed 1.0.2303.633)A vulnerability within the Avira network protection feature allowed an attacker with local execution rights to cause an overflow. This could corrupt the data on the heap and lead to a denial-of-service situation. Issue was fixed with Endpointprotection.exe version 1.0.2303.633 |
|
| CVE-2022-4429 | Jan 10, 2023 |
Unquoted Service Path DoS in Avira Security for Windows 1.1.78Avira Security for Windows contains an unquoted service path which allows attackers with local administrative privileges to cause a Denial of Service. The issue was fixed with Avira Security version 1.1.78 |
|
| CVE-2022-4294 | Jan 10, 2023 |
CVE-2022-4294: PrivEsc Vulnerability in Norton/Avira/Avast/AVG AntivirusNorton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
|
| CVE-2022-3368 | Oct 17, 2022 |
Privilege Escalation in Avira Security <1.1.72.30556 via Software UpdaterA vulnerability within the Software Updater functionality of Avira Security for Windows allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avira Security version 1.1.72.30556. |
|
| CVE-2022-28795 | Apr 12, 2022 |
A vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole whereA vulnerability within the Avira Password Manager Browser Extensions provided a potential loophole where, if a user visited a page crafted by an attacker, the discovered vulnerability could trigger the Password Manager Extension to fill in the password field automatically. An attacker could then access this information via JavaScript. The issue was fixed with the browser extensions version 2.18.5 for Chrome, MS Edge, Opera, Firefox, and Safari. |
|
| CVE-2020-12680 | May 08, 2020 |
Avira Free Antivirus through 15.0.2005.1866 allows local users to discover user credentialsAvira Free Antivirus through 15.0.2005.1866 allows local users to discover user credentials. The functions of the executable file Avira.PWM.NativeMessaging.exe are aimed at collecting credentials stored in Chrome, Firefox, Opera, and Edge. The executable does not verify the calling program and thus a request such as fetchChromePasswords or fetchCredentials will succeed. NOTE: some third parties have stated that this is "not a vulnerability. |
|
| CVE-2020-12463 | May 05, 2020 |
An elevation of privilege vulnerability exists in Avira Software Updater before 2.0.6.27476 due to improperly handling file hard linksAn elevation of privilege vulnerability exists in Avira Software Updater before 2.0.6.27476 due to improperly handling file hard links. This allows local users to obtain take control of arbitrary files. |
|
| CVE-2020-12254 | Apr 26, 2020 |
Avira Antivirus before 5.0.2003.1821 on WindowsAvira Antivirus before 5.0.2003.1821 on Windows allows privilege escalation or a denial of service via abuse of a symlink. |
|
| CVE-2020-8961 | Apr 09, 2020 |
An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injection can be used to turn off this feature. After that, one can construct an event that will modify a file at a specific location, and pass this event to the driver, thereby defeating the anti-virus functionality. |
|
| CVE-2020-9320 | Feb 20, 2020 |
Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archiveAvira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK. NOTE: Vendor asserts that vulnerability does not exist in product |
And others... |
| CVE-2019-18568 | Dec 31, 2019 |
Avira Free Antivirus 15.0.1907.1514 is prone to a local privilege escalation through the execution of kernel codeAvira Free Antivirus 15.0.1907.1514 is prone to a local privilege escalation through the execution of kernel code from a restricted user. |
|
| CVE-2019-17449 | Oct 10, 2019 |
Avira Software Updater before 2.0.6.21094 allows a DLL side-loading attackAvira Software Updater before 2.0.6.21094 allows a DLL side-loading attack. NOTE: The vendor thinks that this vulnerability is invalid because exploiting it would require at least administrator privileges and would gain only SYSTEM privileges |
|
| CVE-2016-10402 | Jul 27, 2017 |
Avira Antivirus engine versions before 8.3.36.60Avira Antivirus engine versions before 8.3.36.60 allow remote code execution as NT AUTHORITY\SYSTEM via a section header with a very large relative virtual address in a PE file, causing an integer overflow and heap-based buffer underflow. |
|
| CVE-2010-5153 | Aug 25, 2012 |
Race condition in Avira Premium Security Suite 10.0.0.536 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous codeRace condition in Avira Premium Security Suite 10.0.0.536 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute |
|