CVE-2026-27749

Avira Internet Security contains a deserialization of untrusted data vulnerability in the System Speedup component. The Avira.SystemSpeedup.RealTimeOptimizer.exe process, which runs with SYSTEM privileges, deserializes data from a file located in C:\\ProgramData using .NET BinaryFormatter without implementing input validation or deserialization safeguards. Because the file can be created or modified by a local user in default configurations, an attacker can supply a crafted serialized payload that is deserialized by the privileged process, resulting in arbitrary code execution as SYSTEM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:avira:internet_security:*:*:*:*:*:windows:*:*

History

13 Mar 2026, 01:21

Type Values Removed Values Added
CPE cpe:2.3:a:avira:internet_security:*:*:*:*:*:windows:*:*
First Time Avira internet Security
Avira
References () https://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html - () https://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html - Third Party Advisory
References () https://support.avira.com/hc/en-us/articles/360010656158-Current-Avira-versions - () https://support.avira.com/hc/en-us/articles/360010656158-Current-Avira-versions - Release Notes
References () https://www.avira.com/en/internet-security - () https://www.avira.com/en/internet-security - Product
References () https://www.vulncheck.com/advisories/avira-internet-security-system-speedup-insecure-deserialization - () https://www.vulncheck.com/advisories/avira-internet-security-system-speedup-insecure-deserialization - Third Party Advisory

05 Mar 2026, 23:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

05 Mar 2026, 19:38

Type Values Removed Values Added
Summary
  • (es) Avira Internet Security contiene una vulnerabilidad de deserialización de datos no confiables en el componente System Speedup. El proceso Avira.SystemSpeedup.RealTimeOptimizer.exe, que se ejecuta con privilegios del SISTEMA, deserializa datos de un archivo ubicado en C:\\ProgramData utilizando .NET BinaryFormatter sin implementar validaciones de entrada ni medidas de seguridad para la deserialización. Dado que el archivo puede ser creado o modificado por un usuario local en las configuraciones predeterminadas, un atacante puede proporcionar una carga útil serializada diseñada que sea deserializada por el proceso con privilegios, lo que da lugar a la ejecución de código arbitrario como SYSTEM.

05 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 15:16

Updated : 2026-03-13 01:21


NVD link : CVE-2026-27749

Mitre link : CVE-2026-27749

CVE.ORG link : CVE-2026-27749


JSON object : View

Products Affected

avira

  • internet_security
CWE
CWE-502

Deserialization of Untrusted Data