{"api_version":"1","generated_at":"2026-04-23T09:39:59+00:00","cve":"CVE-2021-45338","urls":{"html":"https://cve.report/CVE-2021-45338","api":"https://cve.report/api/cve/CVE-2021-45338.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-45338","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-45338"},"summary":{"title":"CVE-2021-45338","description":"Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-12-27 14:15:00","updated_at":"2022-07-12 17:42:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1","refsource":"MISC","tags":[],"title":"Vulnerability-Disclosures/CVE-2021-AVST1.1 at main · the-deniss/Vulnerability-Disclosures · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0","name":"https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0","refsource":"MISC","tags":[],"title":"Researcher Wladimir Palant supports Avast's efforts to protect its users, by submitting vulnerability reports","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3","refsource":"MISC","tags":[],"title":"Vulnerability-Disclosures/CVE-2021-AVST1.3 at main · the-deniss/Vulnerability-Disclosures · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-45338","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-45338","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"45338","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"avast","cpe5":"antivirus","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-45338","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0","refsource":"MISC","name":"https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast-0"},{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1","refsource":"MISC","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.1"},{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2","refsource":"MISC","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.2"},{"url":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3","refsource":"MISC","name":"https://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-AVST1.3"}]}},"nvd":{"publishedDate":"2021-12-27 14:15:00","lastModifiedDate":"2022-07-12 17:42:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*","versionEndExcluding":"20.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"45338","Ordinal":"223462","Title":"CVE-2021-45338","CVE":"CVE-2021-45338","Year":"2021"},"notes":[]}}}