Avira Internet Security Suite Avira Internet Security Suite

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Avira Internet Security Suite.

By the Year

In 2026 there have been 3 vulnerabilities in Avira Internet Security Suite with an average score of 7.8 out of ten. Avira Internet Security Suite did not have any published security vulnerabilities last year. That is, 3 more vulnerabilities have already been reported in 2026 as compared to last year.

Year Vulnerabilities Average Score
2026 3 7.80
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 1 0.00

It may take a day or so for new Avira Internet Security Suite vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Avira Internet Security Suite Security Vulnerabilities

Avira inetSec SoftwareUpdater link resolution deletion pre-v1.1.114
CVE-2026-27748 7.8 - High - March 05, 2026

Avira Internet Security contains an improper link resolution vulnerability in the Software Updater component. During the update process, a privileged service running as SYSTEM deletes a file under C:\\ProgramData without validating whether the path resolves through a symbolic link or reparse point. A local attacker can create a malicious link to redirect the delete operation to an arbitrary file, resulting in deletion of attacker-chosen files with SYSTEM privileges. This may lead to local privilege escalation, denial of service, or system integrity compromise depending on the targeted file and operating system configuration.

insecure temporary file

Avira Internet Security <=1.1.109.1990 Deserialization in System Speedup RTO.exe
CVE-2026-27749 7.8 - High - March 05, 2026

Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM.

Marshaling, Unmarshaling

Avira Internet Security 1.1.109.1990 TOCTOU Privilege Escalation
CVE-2026-27750 7.8 - High - March 05, 2026

Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target path. A local attacker can replace a previously scanned directory with a junction or reparse point before deletion occurs, causing the privileged process to delete an unintended system location. This may result in deletion of protected files or directories and can lead to local privilege escalation, denial of service, or system integrity compromise depending on the affected target.

TOCTTOU

Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive
CVE-2020-9320 - February 20, 2020

Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK. NOTE: Vendor asserts that vulnerability does not exist in product

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Avira Internet Security Suite or by Avira? Click the Watch button to subscribe.

Avira
Vendor

subscribe