CVE-2024-31771
📋 TL;DR
This CVE describes an insecure permission vulnerability in TotalAV antivirus software that allows a local attacker to escalate privileges by creating a specially crafted file. The vulnerability affects users running TotalAV version 6.0.740, enabling attackers to gain elevated system access without proper authorization.
💻 Affected Systems
- TotalAV Antivirus
📦 What is this software?
Totalav by Totalav
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where an attacker gains administrative/root privileges, installs persistent malware, accesses sensitive data, and disables security controls.
Likely Case
Local privilege escalation allowing attackers to bypass security restrictions, install additional malicious software, or modify system configurations.
If Mitigated
Limited impact with proper user account controls, application whitelisting, and monitoring in place to detect privilege escalation attempts.
🎯 Exploit Status
Exploit details and proof-of-concept code are publicly available on GitHub. The vulnerability requires local access but has low technical complexity for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check with TotalAV for latest patched version
Vendor Advisory: Not publicly available at time of analysis
Restart Required: Yes
Instructions:
1. Open TotalAV application. 2. Check for updates in settings. 3. Install available updates. 4. Restart the system to ensure changes take effect.
🔧 Temporary Workarounds
Remove vulnerable TotalAV version
windowsUninstall the vulnerable version of TotalAV and replace with alternative security software
Control Panel > Programs > Uninstall a program > Select TotalAV > Uninstall
Restrict local user permissions
windowsImplement least privilege principles to limit damage from successful exploitation
🧯 If You Can't Patch
- Implement application control policies to prevent execution of unauthorized files
- Enable enhanced monitoring for privilege escalation attempts and file creation activities
🔍 How to Verify
Check if Vulnerable:
Check TotalAV version in application settings or via 'TotalAV.exe --version' command
Check Version:
wmic product where name="TotalAV" get version
Verify Fix Applied:
Verify TotalAV version is updated beyond 6.0.740 and test privilege escalation attempts
📡 Detection & Monitoring
Log Indicators:
- Unexpected file creation in TotalAV directories
- Process creation with elevated privileges from non-admin users
- Failed privilege escalation attempts in security logs
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
EventID=4688 AND ProcessName="TotalAV.exe" AND SubjectUserName!=Administrator AND NewProcessName contains "cmd.exe" OR "powershell.exe"