Advisory

Multiple vulnerabilities in Comodo Internet Security 2025 enable system compromise

Take action: If you're using Comodo Internet Security, be aware it's vulnerable to a malicious update. If possible, hardcode Comodo's update servers to their well known confirmed IP addresses at your firewall and check for updates regularly. Even consider temporarily switching to an alternative antivirus solution.


Learn More

Security researchers have discovered multiple vulnerabilities in Comodo Internet Security 2025 that allow attackers to bypass security mechanisms, execute malicious code with SYSTEM privileges, and establish persistent access to compromised systems. The vulnerabilities affect the antivirus software's update mechanism and file handling processes.

The vulnerabilities are confirmed in Comodo Internet Security Premium version 12.3.4.8162, which was fully updated at the time of discovery. The free Community Edition likely shares the same vulnerable code base for updates, making it equally susceptible to these attacks.

Vulnerabilities summary:

  • CVE-2025-7096 (CVSS score 9.2) - Insufficient Verification of Data Authenticity in update manifest files, leading to remote code execution with SYSTEM privileges
  • CVE-2025-7097 (CVSS score 9.2) - OS command execution vulnerability allowing arbitrary command execution through the manifest file's "exec" tag with SYSTEM privileges. The manifest file's "exec" tag functionality, intended for legitimate update operations, can be weaponized to execute PowerShell payloads or other malicious commands directly with SYSTEM privileges. This bypasses user account controls and leverages Comodo's own trusted processes to run attacker-controlled code.
  • CVE-2025-7098 (CVSS score 6.3) - Path traversal vulnerability enabling arbitrary file writes, including placement of malicious files in the Windows startup folder for persistence. By manipulating the "name" and "folder" attributes in malicious update manifests, attackers can write files to arbitrary locations on the victim's system, including the Windows startup directory.
  • CVE-2025-7095 (CVSS score 6.3) - Improper certificate validation during update server connections, allowing traffic redirection to attacker-controlled servers. The Comodo client does not check the SSL certificate of the server, which allows attackers to redirect traffic to a false update server under their control, for example with a DNS spoofing attack.

The researcher has contacted Comodo, but has not received any feedback. The current patch status remains unclear, as Comodo has not yet released updates addressing these flaws. Users are advised to implement network-level protections including anti-ARP spoofing measures, restrict update server access to official Comodo domains through firewall rules, and monitor network traffic for suspicious update-related communications until patches become available.

Multiple vulnerabilities in Comodo Internet Security 2025 enable system compromise