Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM.
References
| Link | Resource |
|---|---|
| https://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html | Third Party Advisory |
| https://support.avira.com/hc/en-us/articles/360010656158-Current-Avira-versions | Release Notes |
| https://www.avira.com/en/internet-security | Product |
| https://www.vulncheck.com/advisories/avira-internet-security-system-speedup-insecure-deserialization | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-05 15:16
Updated : 2026-03-13 01:21
NVD link : CVE-2026-27749
Mitre link : CVE-2026-27749
CVE.ORG link : CVE-2026-27749
JSON object : View
Products Affected
avira
- internet_security
CWE
CWE-502
Deserialization of Untrusted Data
