Show vulnerabilities with patch / with exploit

Multiple vulnerabilities in Avast Antivirus



Published: 2020-04-02
Severity High
Patch available YES
Number of vulnerabilities 9
CVE ID CVE-2020-10868
CVE-2020-10867
CVE-2020-10866
CVE-2020-10864
CVE-2020-10863
CVE-2020-10862
CVE-2020-10861
CVE-2020-10860
CVE-2020-10865
CWE ID CWE-284
CWE-20
CWE-264
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Avast Antivirus
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Avast Software s.r.o.

Security Advisory

1) Improper access control

Severity: Medium

CVSSv3: 6.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10868

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in che aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and launch the Repair App RPC call from a Low Integrity process.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

Severity: High

CVSSv3: 8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10867

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

Severity: High

CVSSv3: 7.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10866

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and enumerate the network interfaces and access points from a Low Integrity process via RPC.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

Severity: Medium

CVSSv3: 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10864

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can trigger a reboot via RPC from a Low Integrity process.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

Severity: Medium

CVSSv3: 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10863

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Permissions, Privileges, and Access Controls

Severity: Low

CVSSv3: 7.3 [CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10862

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to escalate privileges on the system.

The vulnerability exists due to improper permission checks in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A local attacker can gain elevated privileges via RPC on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Improper access control

Severity: Medium

CVSSv3: 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10861

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and delete arbitrary files from Avast Program Path via RPC, when Self Defense is Enabled.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer overflow

Severity: Medium

CVSSv3: 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10860

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the aswAvLog Log Library. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Improper access control

Severity: High

CVSSv3: 8.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10865

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe). A remote attacker can bypass implemented security restrictions and make arbitrary changes to the Components section of the "Stats.ini" file via RPC from a Low Integrity process.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Avast Antivirus: 19.8.2393

CPE External links

https://forum.avast.com/index.php?topic=232420.0
https://forum.avast.com/index.php?topic=232423.0
https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.