CVE-2020-37037

Avast · Avast Multiple Products

A high-severity vulnerability has been identified in multiple Avast products, including Avast SecureLine.

Executive summary

A high-severity vulnerability has been identified in multiple Avast products, including Avast SecureLine. This flaw could allow a local attacker to escalate their privileges and gain complete control over an affected system, potentially leading to data theft, malware installation, or further network compromise. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a local privilege escalation flaw within a privileged service component of the Avast software. An authenticated, low-privileged local attacker can exploit this by sending a specially crafted input or command to the service. Due to improper input validation or insecure handling of shared resources, the service can be tricked into executing arbitrary code with SYSTEM-level privileges, leading to a full compromise of the host machine.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could have a severe impact on business operations. An attacker who gains administrative control of an endpoint can bypass all local security controls, access or exfiltrate sensitive corporate data, deploy ransomware, or use the compromised machine as a pivot point to move laterally across the internal network. The compromise of a security product like Avast undermines the foundational trust in the organization's security posture and can lead to significant reputational damage and financial loss.

Remediation

Immediate Action: The primary and most effective remediation is to apply the security updates provided by Avast across all affected endpoints without delay. After patching, system administrators should review system and application logs for any signs of anomalous activity that may indicate a prior compromise.

Proactive Monitoring: Implement enhanced monitoring on endpoints running the affected software. Security teams should use SIEM and EDR solutions to monitor for suspicious process creation originating from Avast services, unexpected service restarts, or unauthorized modifications to system files. Monitor for outbound network connections to unknown destinations from affected hosts.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Enforce the principle of least privilege to ensure users do not have unnecessary local administrative rights. Utilize application whitelisting to prevent the execution of unauthorized executables that an attacker might try to run post-exploitation.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high severity (CVSS 7.8) and the potential for a complete system takeover, we strongly recommend that organizations prioritize the immediate patching of this vulnerability. Although there is no evidence of active exploitation in the wild, the risk of a local attacker or malware leveraging this flaw to gain full control of a system is significant. All workstations and servers running the affected Avast products should be identified and updated immediately to prevent potential exploitation.