CVE-2022-AVAST2 : Self-Defense Bypass via Repairing Function

Description

It was noted that there is security checking to prevent some of the Avast processes from loading of undesired/unsigned DLLs via DLL hijacking attack.

However, It was noted that there are two Avast processes “instup.exe” and “wsc_proxy.exe” which are vulnerable to DLL hijacking vulnerability. These processes will attempt to load an non-existing DLL while calling “REPAIR APP” function. Due to the lack of security checking while loading the DLL, attackers who have administrative privilege could drop a malicious DLL on a dedicated location and get it loaded by the affected Avast processes.

Since those vulnerable components are Avast protected processes, attacker could inject malicious code to control the Avast protected processes for malicious purposes such as deactivating the antivirus and staging malware.

For more information

Boa Esperança https://github.com/netero1010/Vulnerability-Disclosure/tree/main/CVE-2022-AVAST2

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-2558 : TENDA AC18 15.03.05.05 /GOFORM/EXECCOMMAND FORMEXECOMMAND CMDINPUT STACK-BASED OVERFLOW

CVE-2024-2558 : TENDA AC18 15.03.05.05 /GOFORM/EXECCOMMAND FORMEXECOMMAND CMDINPUT STACK-BASED OVERFLOW

Description A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function

CVE-2024-28746 : APACHE AIRFLOW 2.8.0/2.8.1/2.8.2 UI IMPROPER AUTHENTICATION

CVE-2024-28746 : APACHE AIRFLOW 2.8.0/2.8.1/2.8.2 UI IMPROPER AUTHENTICATION

Description Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenticated user with limited permissions to access

CVE-2024-2413 : INTUMIT SMARTROBOT UP TO 6.1.2-202212TW HARD-CODED KEY

CVE-2024-2413 : INTUMIT SMARTROBOT UP TO 6.1.2-202212TW HARD-CODED KEY

Description Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this key to encrypt a string