9.3
CVSSv2

CVE-2014-4936

Published: 16/12/2014 Updated: 07/12/2016
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer prior to 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and previous versions allow man-in-the-middle malicious users to execute arbitrary code by spoofing the update server and uploading an executable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

malwarebytes malwarebytes anti-exploit

malwarebytes malwarebytes anti-malware

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = GoodRanking # Would be Great except MBAE doesn't version check include Msf::Exploit::EXE include Msf::Exploit::Remote::HttpServer ...

Github Repositories

Repository for CVE-2014-4936 POC code.

CVE-2014-4936: Malwarebytes Anti-Malware and Anti-Exploit upgrade hijacking ============= This repository contains the POC for CVE-2014-4936 A full writeup on how the vulnerability works and how to exploit it using the POC has been published here: (blog0x3acom/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and) Timeline: Malwarebytes Anti-Malware Vulnerab