CVE-2017-20201
BaseFortify
Publication date: 2025-10-08
Last updated on: 2025-10-14
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| piriform | ccleaner_cloud | 1.07.3191 |
| piriform | ccleaner | 5.33.6162 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-506 | The product contains code that appears to be malicious in nature. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a malicious pre-entry-point loader in CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 (32-bit builds) that diverts execution to a custom loader. This loader decodes embedded shellcode, allocates executable memory, resolves Windows API functions at runtime, and executes an in-memory payload. The payload performs anti-analysis checks, collects host telemetry data, obfuscates it, and attempts to exfiltrate it via HTTPS to hard-coded command and control servers or dynamically generated domains. This allows stealthy execution, persistence, and potential lateral movement within affected systems.
How can this vulnerability impact me? :
The vulnerability can lead to remote data collection and exfiltration from the affected system, stealthy in-memory execution of malicious code, persistence of the malware on the system, and potential lateral movement to other systems within the network, thereby compromising system security and privacy.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update CCleaner to version 5.34 or later, and CCleaner Cloud to version 1.07.3214 or later, as these versions contain the remediation for the malicious loader issue.