CVE-2025-13032

9.9 CRITICAL

📋 TL;DR

A double fetch vulnerability in the sandbox kernel driver of Avast/AVG Antivirus on Windows allows local attackers to escalate privileges via pool overflow. This affects users running Avast or AVG Antivirus versions below 25.3 on Windows systems. Attackers can gain SYSTEM-level privileges from a lower-privileged local account.

💻 Affected Systems

Products:
  • Avast Antivirus
  • AVG Antivirus
Versions: All versions < 25.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations with the vulnerable antivirus software installed. The sandbox kernel driver is a core component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM privileges, enabling complete system compromise, data theft, malware persistence, and disabling of security controls.

🟠

Likely Case

Local attacker escalates to SYSTEM privileges to install malware, steal credentials, or bypass security software.

🟢

If Mitigated

Attack fails due to patch deployment, restricted local access, or security controls preventing kernel exploitation.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised local account (including standard user accounts) can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of kernel exploitation techniques. Double fetch vulnerabilities involve race conditions between user-space and kernel-space memory access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.3 or later

Vendor Advisory: https://www.gendigital.com/us/en/contact-us/security-advisories/

Restart Required: Yes

Instructions:

1. Open Avast/AVG Antivirus. 2. Go to Settings > Update > Program. 3. Click 'Update' to install latest version. 4. Restart computer when prompted.

🔧 Temporary Workarounds

Disable vulnerable driver

windows

Temporarily disable the sandbox kernel driver to prevent exploitation (will reduce security functionality)

sc stop aswSP
sc config aswSP start= disabled

Restrict local access

all

Implement strict local access controls and monitor for suspicious local privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all user accounts
  • Monitor for suspicious kernel driver activity and local privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Avast/AVG version in Settings > About. If version is below 25.3, system is vulnerable.

Check Version:

wmic product where "name like '%Avast%' or name like '%AVG%'" get name, version

Verify Fix Applied:

Verify version is 25.3 or higher in Settings > About. Check that aswSP service is running normally.

📡 Detection & Monitoring

Log Indicators:

  • Kernel driver crashes (Event ID 1001)
  • Unexpected privilege escalation events
  • Suspicious access to kernel memory

Network Indicators:

  • None - this is a local exploit

SIEM Query:

EventID=1001 AND Source="Windows Error Reporting" AND Description contains "aswSP" OR ProcessName contains "Avast" AND NewIntegrityLevel="System"

🔗 References

📤 Share & Export