• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Avast Antivirus Sandbox Vulnerabilities Enable Privilege Escalation

Admin by Admin
December 5, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


SAFA researchers uncovered 4 kernel heap overflow vulnerabilities in Avast Antivirus’s aswSnx.sys driver, designated CVE-2025-13032, affecting variations earlier than 25.3 on Home windows.

These flaws originate from double-fetch points in IOCTL dealing with, enable native attackers to set off pool overflows for privilege escalation to SYSTEM.

The vulnerabilities require sandbox manipulation to entry the assault floor, marking a reversal from typical sandbox escape situations.​

Analysis Method

SAFA focused Avast as a result of its widespread deployment and wealthy kernel assault floor by way of user-accessible drivers, resembling aswSnx, which exposes quite a few IOCTL handlers below permissive ACLs.

Evaluation targeted on kernel parts processing user-controlled information, prioritizing these with excessive IOCTL counts for effectivity in a time-limited audit.

Reverse engineering revealed shared code throughout Gendigital merchandise, probably broadening influence, although unverified.

Guide auditing, mixed with heuristics resembling tracing ProbeForRead calls, rapidly pinpointed flaws in IOCTL 0x82AC0204, which processes user-supplied UNICODE_STRING constructions with out correctly capturing them in kernel reminiscence.

The driving force fetches the Size area twice as soon as for allocation and once more for copying enabling attackers to change it mid-operation for managed heap overflows.

Related points have an effect on the pString and pData fields, together with lacking pointer validation that results in DoS.

The aswSnx driver enforces a customized sandbox by way of snx_lconfig.xml, limiting weak IOCTLs to profiled processes with flags like fAutosandbox and scanhandle=1.

Normal processes lack entry, necessitating config manipulation by means of IOCTL 0x82AC0054, which registers executables below read-only permissions.

This allowed producing a sandboxed exploit.exe to set off crashes and ensure primitives.

Further flaws emerged in the identical handler: loop-based double-fetches on strings for size calculation and allocation, and snprintf misuse throughout course of termination, copying large strings to fastened buffers.

A pData variant repeats the sample with separate sizing iterations earlier than memcpy. These yield user-controlled overflows and DoS by way of invalid pointers.

Avast addressed the problems in model 25.3 by capturing constructions to kernel reminiscence, reusing preliminary lengths, including dimension checks in opposition to fastened buffers, and validating pointers.

CVSS v3.1 scores it at 9.9 (Vital) as a result of low complexity, low privileges wanted, and full CIA influence by way of scope change.

SAFA demonstrated LPE on the newest Home windows 11, proving its viability regardless of sandboxing.

Organizations ought to replace instantly, restrict native privileges, and audit logs for escalation makes an attempt. This underscores persistent dangers in AV kernel drivers, even with defenses.

Comply with us on Google Information, LinkedIn, and X to Get Instantaneous Updates and Set GBH as a Most popular Supply in Google.

Tags: AntivirusAvastEscalationPrivilegeSandboxVulnerabilities
Admin

Admin

Next Post
Metroid Prime 4 Has A Lot Of Vaginal Doorways In It

Metroid Prime 4 Has A Lot Of Vaginal Doorways In It

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

From a Single Story to Numerous Worlds: Pavel Mazhuga’s Path in Inventive Growth

From a Single Story to Numerous Worlds: Pavel Mazhuga’s Path in Inventive Growth

December 13, 2025
Introducing Sophos Id Menace Detection and Response (ITDR) – Sophos Information

Introducing Sophos Id Menace Detection and Response (ITDR) – Sophos Information

October 27, 2025

Trending.

How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
The most effective methods to take notes for Blue Prince, from Blue Prince followers

The most effective methods to take notes for Blue Prince, from Blue Prince followers

April 20, 2025
AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

May 18, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
The right way to Monitor Your YouTube Video Mentions

The right way to Monitor Your YouTube Video Mentions

November 20, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

The Obtain: next-gen nuclear, and the info middle backlash

The Obtain: next-gen nuclear, and the info middle backlash

January 15, 2026
Your data is on the darkish net. What occurs subsequent?

Your data is on the darkish net. What occurs subsequent?

January 15, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved