Impact
An unquoted service path flaw in the AmitiAvSrv and AmitiAntivirusHealth services of Netgate AMITI Antivirus build 23.0.305 allows a local attacker with write access to the file system to place a malicious executable along the unquoted path. When the service is restarted or the system reboots, Windows resolves the unquoted path and executes the attacker–supplied file with LocalSystem privileges, effectively escalating the attacker’s rights. This weakness corresponds to CWE‑428, which describes the risk arising from improper construction of executable paths that may be interpreted incorrectly by the operating system.
Affected Systems
The vulnerability affects Netgate AMITI Antivirus build 23.0.305. No other product versions are listed as impacted in the advisory.
Risk and Exploitability
The CVSS score of 8.5 indicates high severity for a local privilege escalation. Exploitation requires a local user to write to the installation directory and to trigger a service restart or system reboot. Because the EPSS score is not available and the vulnerability is not catalogued in the CISA KEV list, the public exploit risk is uncertain but the impact remains significant if the conditions are met. Until a vendor patch is applied, systems remain at risk from this local attack vector.
OpenCVE Enrichment