malwarebytes CVE Vulnerabilities & Metrics

Focus on malwarebytes vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About malwarebytes Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with malwarebytes. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total malwarebytes CVEs: 24
Earliest CVE date: 16 Dec 2014, 18:59 UTC
Latest CVE date: 04 Feb 2024, 22:15 UTC

Latest CVE reference: CVE-2024-25089

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical malwarebytes CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.63

Max CVSS: 9.3

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 17
7.0-8.9 0
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS malwarebytes CVEs

These are the five CVEs with the highest CVSS scores for malwarebytes, sorted by severity first and recency.

All CVEs for malwarebytes

CVE-2024-25089 malwarebytes vulnerability CVSS: 0 04 Feb 2024, 22:15 UTC

Malwarebytes Binisoft Windows Firewall Control before 6.9.9.2 allows remote attackers to execute arbitrary code via gRPC named pipes.

CVE-2023-29147 malwarebytes vulnerability CVSS: 0 30 Jun 2023, 21:15 UTC

In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.

CVE-2023-29145 malwarebytes vulnerability CVSS: 0 30 Jun 2023, 20:15 UTC

The Malwarebytes EDR 1.0.11 for Linux driver doesn't properly ensure whitelisting of executable libraries loaded by executable files, allowing arbitrary code execution. The attacker can set LD_LIBRARY_PATH, set LD_PRELOAD, or run an executable file in a debugger.

CVE-2023-36631 malwarebytes vulnerability CVSS: 0 26 Jun 2023, 12:15 UTC

Lack of access control in wfc.exe in Malwarebytes Binisoft Windows Firewall Control 6.9.2.0 allows local unprivileged users to bypass Windows Firewall restrictions via the user interface's rules tab. NOTE: the vendor's perspective is "this is intended behavior as the application can be locked using a password."

CVE-2023-28892 malwarebytes vulnerability CVSS: 0 29 Mar 2023, 15:15 UTC

Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.

CVE-2023-26088 malwarebytes vulnerability CVSS: 0 23 Mar 2023, 01:15 UTC

In Malwarebytes before 4.5.23, a symbolic link may be used delete any arbitrary file on the system by exploiting the local quarantine system. It can also lead to privilege escalation in certain scenarios.

CVE-2022-25150 malwarebytes vulnerability CVSS: 4.6 14 Feb 2022, 19:15 UTC

In Malwarebytes Binisoft Windows Firewall Control before 6.8.1.0, programs executed from the Tools tab can be used to escalate privileges.

CVE-2020-25533 malwarebytes vulnerability CVSS: 6.9 15 Jan 2021, 22:15 UTC

An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct a situation where the same PID is used for running two different programs at different times, by leveraging a race condition during crafted use of posix_spawn.

CVE-2020-28641 malwarebytes vulnerability CVSS: 6.6 22 Dec 2020, 23:15 UTC

In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.

CVE-2020-11507 malwarebytes vulnerability CVSS: 6.9 06 Apr 2020, 16:15 UTC

An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner 8.0.3 could cause arbitrary code execution with SYSTEM privileges when a malicious DLL library is loaded.

CVE-2019-19929 malwarebytes vulnerability CVSS: 6.9 23 Dec 2019, 02:15 UTC

An Untrusted Search Path vulnerability in Malwarebytes AdwCleaner before 8.0.1 could cause arbitrary code execution with SYSTEM privileges when a malicious DLL library is loaded by the product.

CVE-2019-6739 malwarebytes vulnerability CVSS: 6.8 03 Jun 2019, 18:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Malwarebytes Antimalware 3.6.1.2711. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. There is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity. Was ZDI-CAN-7162.

CVE-2016-10717 malwarebytes vulnerability CVSS: 4.6 21 Mar 2018, 21:29 UTC

A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.

CVE-2018-5279 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e02c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5278 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e00c. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5277 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e000. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5276 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e018. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5275 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E020. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5274 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40E024. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5273 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e014. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5272 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e004. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5271 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e008. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2018-5270 malwarebytes vulnerability CVSS: 6.1 08 Jan 2018, 05:29 UTC

In Malwarebytes Premium 3.3.1.2183, the driver file (FARFLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9c40e010. NOTE: the vendor reported that they "have not been able to reproduce the issue on any Windows operating system version (32-bit or 64-bit).

CVE-2014-100039 malwarebytes vulnerability CVSS: 2.1 13 Jan 2015, 15:59 UTC

mbae.sys in Malwarebytes Anti-Exploit before 1.05.1.2014 allows local users to cause a denial of service (crash) via a crafted size in an unspecified IOCTL call, which triggers an out-of-bounds read. NOTE: some of these details are obtained from third party information.

CVE-2014-4936 malwarebytes vulnerability CVSS: 9.3 16 Dec 2014, 18:59 UTC

The upgrade functionality in Malwarebytes Anti-Malware (MBAM) consumer before 2.0.3 and Malwarebytes Anti-Exploit (MBAE) consumer 1.04.1.1012 and earlier allow man-in-the-middle attackers to execute arbitrary code by spoofing the update server and uploading an executable.