- Feb 7, 2023
- 3,415
- 21,990
- 4,379
The recently (although now not so recently) updated and upgraded Comodo software (on Chinese forums known as the abandoned house) has been documented to contain three vulnerabilities (new).
They've collectively been assigned the CVE-2025-7095.
More details available here: Comodo Internet Security 2025 Vulnerabilities Execute Remote Code With SYSTEM Privilege
The attack complexity is rated as high, but successful attack enables full system control, as well as delivery of additional malicious payloads and credentials harvesting.
This signifies the importance of using up-to-date and actively developed software.
A user-mode app like a player can wreak havoc when exploited, a security solution nested deeply in the system kernel is even more dangerous.
Last but not least, I advise users to be careful and sceptical when someone advises them that it's OK to run outdated and vulnerable software. Always do your due diligence, specially when alternatives exist.
They've collectively been assigned the CVE-2025-7095.
More details available here: Comodo Internet Security 2025 Vulnerabilities Execute Remote Code With SYSTEM Privilege
Key Takeaways
1. CVE-2025-7095 in Comodo Internet Security Premium 12.3.4.8162 enables remote code execution with SYSTEM privileges.
2. Improper certificate validation allows attackers to redirect updates to malicious servers via DNS spoofing.
3. Fake update manifests can execute arbitrary commands with SYSTEM privileges, deploying backdoors and harvesting credentials.
4. Path traversal flaws enable malware installation in Windows startup directories with cross-reboot persistence.
The attack complexity is rated as high, but successful attack enables full system control, as well as delivery of additional malicious payloads and credentials harvesting.
This signifies the importance of using up-to-date and actively developed software.
A user-mode app like a player can wreak havoc when exploited, a security solution nested deeply in the system kernel is even more dangerous.
Last but not least, I advise users to be careful and sceptical when someone advises them that it's OK to run outdated and vulnerable software. Always do your due diligence, specially when alternatives exist.
Multiple critical vulnerabilities in Comodo Internet Security Premium 2025 allow attackers to execute remote code with SYSTEM privileges, completely compromising victim systems through malicious update packages.
The vulnerabilities, collectively assigned CVE-2025-7095, affect version 12.3.4.8162 and were discovered by FPT IS Security researchers.
Key Takeaways
1. CVE-2025-7095 in Comodo Internet Security Premium 12.3.4.8162 enables remote code execution with SYSTEM privileges.
2. Improper certificate validation allows attackers to redirect updates to malicious servers via DNS spoofing.
3. Fake update manifests can execute arbitrary commands with SYSTEM privileges, deploying backdoors and harvesting credentials.
4. Path traversal flaws enable malware installation in Windows startup directories with cross-reboot persistence.
Improper Certificate Validation (CWE-295)
The primary vulnerability stems from improper certificate validation (CWE-295) in Comodo’s update mechanism.
Despite using HTTPS connections to https://download.comodo.com/ for updates, the security software fails to validate SSL certificates, enabling attackers to redirect update traffic to malicious servers through DNS spoofing attacks.
Researchers demonstrated the attack using a Python script leveraging the Scapy library to perform DNS redirection.
The attack requires positioning on the victim’s network to intercept DNS queries for download.comodo.com and redirect them to an attacker-controlled server at 192.168.58.192.
The proof-of-concept code includes ARP spoofing commands like sudo arpspoof -i eth0 -t 10.10.14.4 -r 10.10.14.1 to establish the necessary network position.
Insufficient Verification of Data Authenticity (CWE-345)
The second critical flaw involves insufficient verification of data authenticity (CWE-345) in the update manifest file cis_update_x64.xml.
Attackers can craft malicious manifest files containing an <exec> tag that executes arbitrary commands with SYSTEM privileges.
The vulnerability allows execution of PowerShell payloads through parameters like:
![]()
This enables attackers to deliver Metasploit payloads, establishing persistent backdoors that bypass Comodo’s containerization technology.
Researchers successfully demonstrated credential harvesting using hashdump and mimikatz modules, extracting Windows password hashes including Administrator accounts.
Path Traversal (CWE-22)
A third vulnerability involves path traversal (CWE-22) in the update system’s file placement mechanism.
Attackers can exploit the folder parameter in manifest files using directory traversal sequences like ../../../ProgramData/Microsoft/Windows/Start Menu/Programs/Startup/ to write malicious files directly to the Windows startup directory.
The attack places malicious batch files containing Base64-encoded PowerShellreverse shells in the startup folder, ensuring persistence across system reboots.
The payload executes with user privileges initially but can escalate to SYSTEM using UAC bypass techniques like the bypassuac_sdclt module.
The vulnerabilities carry a CVSS 4.0 score of 6.3 (Medium severity), though the actual impact is severe due to the potential for complete system compromise.
The attack complexity is rated as high, requiring network positioning for DNS spoofing, but successful exploitation results in full administrative control over target systems.
Risk Factors Details Affected Products Comodo Internet Security Premium 12.3.4.8162 Impact Remote code execution with SYSTEM privileges Exploit Prerequisites Network positioning for DNS spoofing, high attack complexity, remote network access CVSS 4.0 Score 6.3 (Medium)
Comodo has not responded to vulnerability disclosure attempts. Users should implement network-level protections and monitor for suspicious update activities until patches are available.
Last edited: