CVE-2016-4025
moderate-risk
Published 2016-11-03
Avast Internet Security v11.x.x, Pro Antivirus v11.x.x, Premier v11.x.x, Free Antivirus v11.x.x, Business Security v11.x.x, Endpoint Protection v8.x.x, Endpoint Protection Plus v8.x.x, Endpoint Protection Suite v8.x.x, Endpoint Protection Suite Plus v8.x.x, File Server Security v8.x.x, and Email Server Security v8.x.x allow attackers to bypass the DeepScreen feature via a DeviceIoControl call.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (20)
Business Security
Business Security
Business Security
Business Security
Free Antivirus
Free Antivirus
Internet Security
Internet Security
Internet Security
Premier
Premier
Premier
Pro Antivirus
Pro Antivirus
Pro Antivirus
Pro Antivirus
Pro Antivirus
Endpoint Protection
Endpoint Protection Plus
Endpoint Protection Suite
Affected Vendors
References (2)
Technical Description
https://labs.nettitude.com/blog/escaping-avast-sandbox-using-single-ioctl-cve-20...
Technical Description
https://labs.nettitude.com/blog/escaping-avast-sandbox-using-single-ioctl-cve-20...
42
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
24/34 · High