A vulnerability has been found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this vulnerability is the function passPrompt of the component USB Protection Service. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.295969 | Permissions Required VDB Entry | 
| https://vuldb.com/?id.295969 | Third Party Advisory VDB Entry | 
| https://vuldb.com/?submit.496481 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    10 Oct 2025, 15:05
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.295969 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.295969 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.496481 - Third Party Advisory, VDB Entry | |
| First Time | Escanav Escanav escan Anti-virus | |
| CPE | cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:* | 
16 Feb 2025, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-16 23:15
Updated : 2025-10-10 15:05
NVD link : CVE-2025-1364
Mitre link : CVE-2025-1364
CVE.ORG link : CVE-2025-1364
JSON object : View
Products Affected
                escanav
- escan_anti-virus
