Windows Defender Signature-Update Pathname Vulnerability

Windows Defender Signature-Update Pathname Vulnerability

CVE-2013-3154 · MEDIUM Severity

AV:L/AC:M/AU:N/C:C/I:C/A:C

The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability."

Learn more about our Cis Benchmark Audit For Server Software.