New Version 12.3.3.8152 Available for Comodo Internet Security 2025

Thank you very much Cassette for your participation and your essay.

It is distressing to see that Comodo CIS is currently dysfunctional. I am confident that this will be corrected.

I think it will as soon as the devs take a break from Xcitium and return to Comodo.

A difficult period, but hope springs eternal…

Let’s hope this will happen.

1 Like

1 restart needed? Yeah right, 1 to install update and 2nd to finalize installation and CIS does initial scan.

Also so very “nice” that update cleared Whitelisted programs (started Seamonkey and immediately CIS was asking can it access to things a-z). CIS sent Renpy-game to Container and previously it started just fine and also that other PIA game (worked fine in older CIS but prev. version wanted to prevent it running outside Container) CIS popped few questions about it

Who knows how many of current games I need to answer to 20 questions and add to Whitelist to get those work properly.

End ranting.

1 Like

You should always do a fresh install for any major CIS update. There was a certificate issue with the previous version which is probably why your having issues with having upgraded rather than doing a clean install. I’ve not had any issues at my end.

1 Like

Can’t do that either, when trying to uninstall I get error saying cmdhtml.dll wasn’t properly signed. Installation aborted.

Did totally clean uninstallation (short of formatting system drive and reinstalling Windows) when 8140 came.

1 Like

That doesn’t sound good for anyone that has 8140 installed and just expect an in place upgrade as per other programs. Some are not technical / experienced users.

Unless it has changed in the last day ( 27/11/2024 ), the one downloaded from the COMODO website is still the version with the certificate issue !!

1 Like

I have no security certificate issues after installing the proposed versions.

Downloaded version from the website https://antivirus.comodo.com/ does have valid certificates

loving the new version. no major issues if not at all

Hi, On the main website it is still the version with the certificate issue as I have just tried it. :-1:

1 Like

It seems the issue is the links on www.comodo.com/antivirus-internet-security/ specifically are still going to the old version with the revoked certificate.

2 Likes

Hi EricCryptid,

Thank you for bringing this to our notice.
We will take this to the team and update you.

Thanks
C.O.M.O.D.O RT

Thanks. The CIS Pro that gets downloaded from https://www.comodo.com/antivirus-internet-security/#cis has the certificate issue

Website needs clarification as downloading from https://antivirus.comodo.com/ downloads the Premium version and that one’s certificate is fine as indicated in my earlier post.

1 Like

P.S. Microsoft Defender now detects Killswitch as a PUP which is easy enough to just allow. and definitely a False Positive and only the temporary file when installing Killswitch. Amusingly, it installs anyway despite the MD pop-up :slight_smile:

Obviously, not a issue if using full CIS.

1 Like

Somebody has asked earlier but it seems that it got ignored. When are the users of 8140 going to be automatically updated to 8152?

1 Like

Hello. Dear Eric Cryptid
Moderator, can you tell me how dangerous this is for a home user

“Automatic bypass of the PoC-Isolated CIS environment" ?

(post deleted by author)

My post was in reference to a False Positive. KIS protection is on par with CIS so if you have paid for a KIS subscription and enjoy using it, you’re just as well protect.

You can block the containment bypass by several means.

  1. Simply setting Auto-Containment to Block
  2. Enabling HIPS (just be sure you know what you are allowing with the alerts)
  3. Disabling UAC completely (as recommended by @cruelsister )
  4. it can even be fixed with some simple windows hardening if you don’t want to go down the route of disabling UAC. SimpleWindowsHardening Tool

Whatever you decide, the likelihood of malware actually deploying such a mechanism is very very rare and I’ve not seen a real world example. The videos showing such an bypass are running it already allowed onto the system and any parent unknown would be blocked either by Comodo or KIS in the first place :wink:

1 Like

Hi Eric Cryptid !

Hummm…

I’ve just been hit by a Lazagne-type attack and I’m not sure whether unblocking the UAC is a good idea…

Do you know how Comodo CIS reacts to Lazagne-type attacks?

Has anyone here ever been hit by one?

Or tested it?

Personally, I had to reset my PC.

During this attack, I had my e-mail account login and password stolen from the PC. There was a load in Mozilla Firefox that escaped me…

And not just me, if you know what I mean…

So, I’ll never deactivate UAC again…

(Even if you’re going to tell me, very confidently, that this has nothing to do with it)…

I apologize if I’m not too enthusiastic, because then my compromised e-mail address was used for the wrong purposes…

If at least my Comodo CIS PRO license had been validated, I could have requested a Comodo remote intervention via Geekbuddy… Well, no… not even that!

I’ve reset Windows. I’ll reinstall Comodo CIS Pro when the new version resolves the latest bugs… and especially the previous ones…