CVE-2024-13206

7.8 HIGH

📋 TL;DR

This critical vulnerability in REVE Antivirus 1.0.0.0 on Linux involves incorrect default permissions on the /usr/local/reveantivirus/tmp/reveinstall file, allowing local attackers to potentially escalate privileges or modify system files. Only Linux systems running REVE Antivirus 1.0.0.0 are affected. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • REVE Antivirus
Versions: 1.0.0.0
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Linux installations with the default /usr/local/reveantivirus/tmp/reveinstall file present.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Local users gaining unauthorized elevated privileges to modify antivirus configurations or system files.

🟢

If Mitigated

Limited impact with proper file permission controls and restricted local access.

🌐 Internet-Facing: LOW - Requires local host access, not directly exploitable over network.
🏢 Internal Only: HIGH - Any local user on affected systems can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available in GitHub repository. Requires local user access to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Apply workarounds or consider alternative antivirus solutions.

🔧 Temporary Workarounds

Fix File Permissions

linux

Set secure permissions on the vulnerable file to prevent unauthorized access

sudo chmod 600 /usr/local/reveantivirus/tmp/reveinstall
sudo chown root:root /usr/local/reveantivirus/tmp/reveinstall

Remove Vulnerable File

linux

Delete the vulnerable file if not required for antivirus functionality

sudo rm -f /usr/local/reveantivirus/tmp/reveinstall

🧯 If You Can't Patch

  • Restrict local user access to affected systems
  • Monitor file permission changes on /usr/local/reveantivirus/tmp/reveinstall

🔍 How to Verify

Check if Vulnerable:

Check if file exists and has insecure permissions: ls -la /usr/local/reveantivirus/tmp/reveinstall

Check Version:

Check REVE Antivirus version if available, or verify installation directory exists

Verify Fix Applied:

Verify file permissions are secure: ls -la /usr/local/reveantivirus/tmp/reveinstall should show -rw------- root root

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /usr/local/reveantivirus/tmp/reveinstall
  • Permission changes on the vulnerable file

Network Indicators:

  • N/A - Local vulnerability only

SIEM Query:

file_access AND file_path:"/usr/local/reveantivirus/tmp/reveinstall" AND NOT user:root

🔗 References

📤 Share & Export