Uncategorized

Comodo Internet Security 2025 Vulnerabilities Allows Remote Code Execution System Privileges

A series of critical vulnerabilities have been discovered in Comodo Internet Security Premium (CISP) version 12.3.4.8162, potentially allowing remote attackers to execute arbitrary code with SYSTEM privileges.

The Vulnerabilities, disclosed under CVE-2025-7095, stem from improper certificate validation, insufficient data authenticity checks, and path traversal weaknesses in the update mechanism.

Security researchers have demonstrated that these vulnerabilities can be chained to deliver persistent malware and gain full control of victim systems, even bypassing Comodo’s own isolation mechanisms.

The root of the attack lies in Comodo’s failure to properly validate SSL certificates when connecting to its update server (download.comodo.com).

By default, Comodo Internet Security uses HTTPS for update checks but does not verify the authenticity of the server’s SSL certificate.

This oversight (CWE-295: Improper Certificate Validation) allows a threat actor to perform a DNS spoofing attack, redirecting update traffic to a malicious server under their control.

Attack Scenario:

  • The attacker sets up a rogue HTTPS server with a self-signed certificate.
  • Through DNS spoofing and ARP poisoning, the victim’s update requests are transparently redirected to the attacker’s server.
  • Comodo accepts the connection without warning, failing to detect the invalid certificate.

This enables attackers to serve fake update packages to any user on the same network, with the victim none the wiser.

Remote Code Execution

Once the update traffic is hijacked, the attacker can exploit further weaknesses in the update process:

a. Insufficient Verification of Update Files (CWE-345):
Comodo Internet Security does not verify the authenticity or integrity of the update manifest file (cis_update_x64.xml). An attacker can craft a malicious manifest referencing arbitrary binaries or scripts.

b. OS Command Injection (CWE-77):
The manifest’s <exec> section allows arbitrary binaries to be executed with SYSTEM privileges. By inserting a reference to a malicious script (e.g., a PowerShell Meterpreter payload), the attacker gains remote code execution at the highest privilege level.

Demonstrated Impact:

  • Malicious update packages can be delivered and executed as SYSTEM.
  • Attackers can run post-exploitation tools like Mimikatz or hashdump to extract credentials and maintain persistence.
  • Comodo’s process isolation is insufficient to contain the attack, as the malicious code inherits SYSTEM privileges.

Persistent Malware Installation

A further vulnerability arises from improper input sanitization in the update manifest:

a. Path Traversal in File and Folder Names (CWE-22):
The update process uses the name and folder attributes from the manifest to determine where files are written. By including path traversal sequences (e.g., ../../../../../), an attacker can write files anywhere on the system, including the Windows Startup directory.

b. Persistent Backdoors:
By placing a malicious batch file in the Startup folder, the attacker ensures their payload is executed every time the system reboots, allowing for persistent remote access.

Proof-of-Concept:
Researchers demonstrated that after a successful spoofed update, a malicious file was written to the Startup directory. Upon reboot, the attacker regained SYSTEM-level access without further user interaction.

These vulnerabilities in Comodo Internet Security Premium 2025 addressed a severe risk to users, especially in environments where attackers can manipulate network traffic. The vulnerabilities allow for full remote compromise of affected systems, persistent malware installation, and complete bypass of Comodo’s security controls.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.



Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago