CVE-2025-8351

9.0 CRITICAL

📋 TL;DR

A heap-based buffer overflow and out-of-bounds read vulnerability in Avast Antivirus for macOS allows local attackers to execute arbitrary code or cause denial-of-service by scanning a specially crafted malicious file. This affects macOS users running vulnerable versions of Avast Antivirus. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • Avast Antivirus for macOS
Versions: from 8.3.70.94 before 8.3.70.98
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS version of Avast Antivirus. Requires antivirus scanning to be enabled (default).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full system control through arbitrary code execution, potentially installing persistent malware, stealing data, or compromising the entire system.

🟠

Likely Case

Local denial-of-service of the antivirus engine process, leaving the system unprotected against other threats while the service is down.

🟢

If Mitigated

Limited impact if antivirus is running with minimal privileges and proper sandboxing, though DoS is still possible.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system; cannot be exploited remotely over the network.
🏢 Internal Only: HIGH - Any local user or process with ability to place files on the system could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access to create/place malicious file and trigger antivirus scan. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.70.98 or later

Vendor Advisory: https://www.gendigital.com/us/en/contact-us/security-advisories/

Restart Required: Yes

Instructions:

1. Open Avast Antivirus on macOS. 2. Go to Menu > Check for Updates. 3. Install available updates. 4. Restart the system if prompted.

🔧 Temporary Workarounds

Disable real-time scanning

all

Temporarily disable real-time file scanning to prevent triggering the vulnerability

Open Avast Antivirus > Preferences > Shields > Disable File Shield

Restrict local user access

linux

Limit which users can place files in directories scanned by Avast

sudo chmod 750 /path/to/scanned/directories

🧯 If You Can't Patch

  • Implement strict file upload controls and scanning of user-uploaded content before it reaches the system
  • Run Avast Antivirus with minimal privileges and in sandboxed environment if possible

🔍 How to Verify

Check if Vulnerable:

Check Avast version in application or run: /Applications/Avast.app/Contents/MacOS/Avast -v

Check Version:

/Applications/Avast.app/Contents/MacOS/Avast -v

Verify Fix Applied:

Verify version is 8.3.70.98 or higher using the same command

📡 Detection & Monitoring

Log Indicators:

  • Avast process crashes or unexpected termination
  • High CPU/memory usage by Avast processes before crash
  • Failed scan attempts on specific file patterns

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

process_name:"Avast" AND (event_type:"crash" OR exit_code:139 OR signal:11)

🔗 References

📤 Share & Export