CVE-2024-45520

7.5 HIGH

📋 TL;DR

CVE-2024-45520 is a memory corruption vulnerability in WithSecure Atlant (formerly F-Secure Atlant) that allows remote attackers to cause denial of service by sending specially crafted PE32 files. Organizations using Atlant for file scanning are affected, particularly those processing untrusted files.

💻 Affected Systems

Products:
  • WithSecure Atlant (formerly F-Secure Atlant)
Versions: 1.0.35-1
Operating Systems: All supported platforms running Atlant
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers during PE32 file scanning, so only systems configured to scan such files are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Atlant scanning functionality, potentially affecting dependent security workflows and causing system instability.

🟠

Likely Case

Scanning service crashes when processing malicious PE32 files, requiring service restart and causing temporary scanning downtime.

🟢

If Mitigated

Limited impact with proper network segmentation and file input validation, though scanning interruptions may still occur.

🌐 Internet-Facing: MEDIUM - Requires attacker to deliver malicious PE32 file to scanning service, which typically processes files from various sources.
🏢 Internal Only: MEDIUM - Internal users or processes could trigger the vulnerability by submitting malicious files for scanning.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires delivering a specially crafted PE32 file to the scanning service. No authentication bypass needed if scanning service accepts external files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version beyond 1.0.35-1 (check vendor advisory for specific fixed version)

Vendor Advisory: https://www.withsecure.com/en/support/security-advisories/cve-2024-45520

Restart Required: No

Instructions:

1. Check current Atlant version. 2. Download latest version from WithSecure. 3. Follow vendor upgrade instructions. 4. Verify successful update.

🔧 Temporary Workarounds

Temporary PE32 scanning restriction

all

Configure Atlant to skip or quarantine PE32 files temporarily until patched

# Configure in Atlant management interface or configuration files per vendor documentation

🧯 If You Can't Patch

  • Implement strict file upload controls and validation before files reach Atlant scanning
  • Isolate Atlant scanning service in segmented network with limited exposure

🔍 How to Verify

Check if Vulnerable:

Check Atlant version via management interface or command: atlant --version

Check Version:

atlant --version

Verify Fix Applied:

Confirm version is updated beyond 1.0.35-1 and test scanning functionality with known safe PE32 files

📡 Detection & Monitoring

Log Indicators:

  • Atlant service crashes
  • Memory access violation errors in logs
  • Scanning process termination

Network Indicators:

  • Unusual PE32 file submissions to scanning service
  • Repeated scanning failures

SIEM Query:

source="atlant" AND ("crash" OR "memory" OR "corruption" OR "segmentation fault")

🔗 References

📤 Share & Export