CVE-2019-25360

9.8 CRITICAL

📋 TL;DR

CVE-2019-25360 is a critical buffer overflow vulnerability in Aida64 Engineer's CSV logging configuration that allows remote code execution. Attackers can exploit it by crafting malicious log files with SEH overwrite techniques to execute arbitrary code. This affects all users running vulnerable versions of Aida64 Engineer.

💻 Affected Systems

Products:
  • Aida64 Engineer
Versions: 6.10.5200 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the CSV logging feature which is enabled by default. Any system running the vulnerable version with CSV logging configured is at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to malware installation, data exfiltration, or system disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and application whitelisting are implemented, though the vulnerability remains exploitable.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 47574), making this easily weaponizable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.10.5201 and later

Vendor Advisory: https://www.aida64.com/downloads/OTAwMmVmNTE=

Restart Required: Yes

Instructions:

1. Download the latest version from the official Aida64 website. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system to ensure all components are properly loaded.

🔧 Temporary Workarounds

Disable CSV Logging

windows

Temporarily disable CSV logging functionality to prevent exploitation until patching can be completed.

Open Aida64 Engineer > Preferences > Logging > Uncheck 'Enable CSV logging'

Restrict File Access

windows

Apply strict file permissions to prevent unauthorized users from creating or modifying log files in the Aida64 directory.

icacls "C:\Program Files\Aida64\" /deny Everyone:(OI)(CI)(W,R,X)

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries.
  • Deploy network segmentation to isolate systems running Aida64 from critical infrastructure.

🔍 How to Verify

Check if Vulnerable:

Check the Aida64 version by opening the application and navigating to Help > About. If the version is 6.10.5200 or earlier, the system is vulnerable.

Check Version:

Open Aida64 Engineer and check Help > About menu

Verify Fix Applied:

After updating, verify the version shows 6.10.5201 or later in Help > About. Test CSV logging functionality to ensure it works without crashing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Aida64.exe
  • CSV log files with abnormal size or content patterns
  • Access violations or buffer overflow errors in Windows Event Logs

Network Indicators:

  • Outbound connections from Aida64.exe to suspicious IP addresses
  • Unexpected network traffic from systems running Aida64

SIEM Query:

Process Creation where Image contains 'Aida64.exe' AND CommandLine contains '.csv' OR ParentImage contains 'Aida64.exe'

🔗 References

📤 Share & Export