CVE-2024-5803

7.5 HIGH

📋 TL;DR

This vulnerability allows a local attacker to escalate privileges via COM hijack in AVG/Avast Antivirus when self-protection is disabled. It affects users running vulnerable versions of these antivirus products on Windows systems. The attacker must already have local access to the system to exploit this flaw.

💻 Affected Systems

Products:
  • AVG Antivirus
  • Avast Antivirus
Versions: Versions before 24.1
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when self-protection feature is disabled. Default configuration has self-protection enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, malware persistence, and lateral movement.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access protected resources.

🟢

If Mitigated

With self-protection enabled (default), the vulnerability cannot be exploited, maintaining normal security posture.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access, not remotely exploitable.
🏢 Internal Only: HIGH - Significant risk in environments where attackers gain initial foothold through phishing or other means, enabling privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and self-protection disabled. TOCTOU race condition exploitation requires precise timing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 24.1 or later

Vendor Advisory: https://support.norton.com/sp/static/external/tools/security-advisories.html

Restart Required: Yes

Instructions:

1. Open AVG/Avast Antivirus. 2. Navigate to Settings > General > Update. 3. Click 'Check for updates'. 4. Install available updates. 5. Restart computer when prompted.

🔧 Temporary Workarounds

Enable Self-Protection

windows

Ensure the antivirus self-protection feature is enabled to prevent exploitation

Open AVG/Avast > Settings > Troubleshooting > Enable 'Enable self-defense' or 'Enable self-protection'

🧯 If You Can't Patch

  • Ensure antivirus self-protection feature is enabled at all times
  • Implement strict local access controls and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check AVG/Avast version in Settings > About. If version is below 24.1 and self-protection is disabled, system is vulnerable.

Check Version:

wmic product where "name like 'AVG%' or name like 'Avast%'" get name, version

Verify Fix Applied:

Verify version is 24.1 or higher in Settings > About and confirm self-protection is enabled in Settings > Troubleshooting.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • AVGUI.exe process manipulation
  • COM object registration/modification

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=4688 AND (ProcessName='AVGUI.exe' OR ParentProcessName='AVGUI.exe') AND NewProcessName contains 'cmd.exe' OR 'powershell.exe'

🔗 References

📤 Share & Export