CVE-2019-25287

Adaware · Web Companion

Adaware Web Companion version 4 contains a high-severity security vulnerability that could allow for unauthorized system modifications. The flaw affects the software's ability to protect web traffic.

Executive summary

A significant security vulnerability in Adaware Web Companion version 4 could allow an attacker to bypass web protections and compromise the host system.

Vulnerability

This vulnerability affects Adaware Web Companion version 4. Given its CVSS score of 7.8, the flaw likely involves a local privilege escalation or an insecure update mechanism, which could be exploited to execute unauthorized code with high privileges on the user's machine.

Business impact

The compromise of a web security tool is a serious risk, as it can be used to facilitate further attacks, such as man-in-the-middle (MitM) interceptions or the redirection of users to malicious websites. This could lead to the theft of sensitive credentials and the infection of the corporate network with malware.

Remediation

Immediate Action: Users should update Adaware Web Companion to the latest version immediately or uninstall version 4 if it is no longer required for business operations.

Proactive Monitoring: Monitor for unauthorized changes to browser settings, proxy configurations, or the installation of unexpected root certificates.

Compensating Controls: Use enterprise-grade web filtering and endpoint protection platforms that provide more robust security and are subject to frequent, automated updates.

Exploitation status

Public Exploit Available: false

Analyst recommendation

We recommend that organizations minimize the use of third-party web "companions" in favor of built-in browser security features and enterprise-managed security suites. If this software is necessary, it must be updated immediately to the latest secure version to mitigate the identified high-severity risk.