Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
- https://support.kaspersky.com/general/vulnerability.aspx?el=12430#021219
- https://github.com/alphaSeclab/sec-daily-2019