Impact
A low‑privilege user can replace or delete files during the installation of Norton Secure VPN via the Microsoft Store. This flaw allows the user to remove critical files that the installer expects to be present, potentially enabling the installation of malicious components or the bypass of integrity checks. The outcome is an elevation of privileges, giving the attacker higher system access than originally granted.
Affected Systems
The vulnerability affects Gen Digital’s Norton Secure VPN when installed through the Microsoft Store. No specific version ranges are disclosed, so any deployment using the Microsoft Store installer should be considered vulnerable until a patch is applied.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.8, indicating high severity. EPSS data is not available, and the issue is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet. However, the attack requires local access during installation, meaning a regular user with installation rights can trigger the flaw. If exploited, the attacker can gain elevated privileges on the host system.
OpenCVE Enrichment