CVE-2025-10101

8.1 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Avast Antivirus for macOS allows local attackers to execute arbitrary code or cause denial of service by crafting a malicious Mach-O file. This affects macOS users running Avast Antivirus versions from 15.7 up to but not including the patch released on March 9, 2025.

💻 Affected Systems

Products:
  • Avast Antivirus for macOS
Versions: from 15.7 before 3.9.2025
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS versions where Avast Antivirus is installed. Requires local access to execute crafted Mach-O file.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise, antivirus protection disabled, and persistence mechanisms installed.

🟠

Likely Case

Local code execution with user privileges, antivirus service crash resulting in temporary loss of protection.

🟢

If Mitigated

Limited to denial of service affecting only the antivirus component if proper sandboxing and exploit mitigations are in place.

🌐 Internet-Facing: LOW - Requires local access and file execution; not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or malware with user access can exploit this to escalate privileges and disable security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute a crafted Mach-O file. Heap exploitation requires specific knowledge of memory layout.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version released on or after March 9, 2025

Vendor Advisory: https://www.gendigital.com/us/en/contact-us/security-advisories/

Restart Required: Yes

Instructions:

1. Open Avast Antivirus. 2. Navigate to Settings > Update. 3. Click 'Check for Updates'. 4. Install any available updates. 5. Restart the computer to ensure complete patch application.

🔧 Temporary Workarounds

Disable automatic Mach-O file scanning

all

Temporarily disable scanning of Mach-O files to prevent exploitation while awaiting patch

Restrict local user privileges

all

Implement least privilege access controls to limit who can execute local files

🧯 If You Can't Patch

  • Uninstall Avast Antivirus and use alternative security software
  • Implement application whitelisting to prevent execution of unauthorized Mach-O files

🔍 How to Verify

Check if Vulnerable:

Check Avast Antivirus version in application settings or via 'avast --version' in terminal. If version is between 15.7 and before March 9, 2025 release, system is vulnerable.

Check Version:

avast --version

Verify Fix Applied:

Verify Avast Antivirus version is March 9, 2025 or later. Test with known safe Mach-O files to ensure scanning functionality works without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Avast service crashes or unexpected terminations
  • Unusual Mach-O file scanning errors in Avast logs
  • Failed signature updates

Network Indicators:

  • None - this is a local exploitation vulnerability

SIEM Query:

source="avast.log" AND ("crash" OR "terminated unexpectedly" OR "buffer overflow")

🔗 References

📤 Share & Export