CVE-2022-28886: Denial of Service Vulnerability in F-Secure and WithSecure All F-Secure and WithSecure Endpoint Protection products for Windows running 32 bit operating system. F-Secure Linux Security 32 F-Secure Internet Gatekeeper
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine
AI Analysis
Technical Summary
CVE-2022-28886 is a Denial-of-Service (DoS) vulnerability affecting all versions of F-Secure and WithSecure Endpoint Protection products running on 32-bit Windows operating systems, as well as F-Secure Linux Security 32 and F-Secure Internet Gatekeeper. The vulnerability arises from the aerdl.so (Linux) and aerdl.dll (Windows) components responsible for unpacking Portable Executable (PE) files. Specifically, these components may enter an infinite loop when processing certain crafted PE files, causing the scanning engine to crash. This infinite loop condition is classified under CWE-835 (Loop with Unreachable Exit Condition), indicating a logic flaw that prevents normal termination of the loop. The vulnerability requires high privileges (PR:H) and user interaction (UI:R) to be exploited, with network attack vector (AV:N), meaning the attack can be performed remotely over the network. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects availability, as the scanning engine crash can disrupt endpoint protection services, potentially leaving systems unprotected against other threats. Confidentiality and integrity impacts are rated low. No known exploits are reported in the wild, and no patches or mitigations have been explicitly linked in the provided information. The vulnerability affects legacy 32-bit systems, which are less common but still present in some enterprise environments. The infinite loop in unpacking PE files could be triggered by maliciously crafted files delivered via email, downloads, or network shares, causing denial of service on endpoint protection components and possibly leading to gaps in malware detection and response.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of endpoint protection on affected 32-bit Windows and Linux systems. If exploited, the scanning engine crash could disable or degrade the effectiveness of F-Secure and WithSecure security products, increasing exposure to malware and other cyber threats. Organizations relying on these products for critical infrastructure protection, especially those with legacy 32-bit systems, may experience interruptions in security monitoring and incident response capabilities. This could be particularly impactful in sectors with high security requirements such as finance, healthcare, government, and critical infrastructure. The medium severity rating and requirement for high privileges and user interaction reduce the likelihood of widespread exploitation; however, targeted attacks against vulnerable systems remain a concern. The lack of known exploits in the wild suggests limited active exploitation but does not eliminate future risk. European organizations with mixed architectures that include legacy 32-bit endpoints should assess their exposure and consider the potential operational impact of endpoint protection failures.
Mitigation Recommendations
1. Inventory and identify all systems running 32-bit Windows and Linux versions of F-Secure and WithSecure endpoint products to assess exposure. 2. Where possible, upgrade affected systems to 64-bit operating systems and endpoint protection versions, as the vulnerability specifically affects 32-bit versions. 3. Implement strict access controls to limit high privilege accounts and reduce the risk of exploitation requiring elevated privileges. 4. Educate users to avoid opening or executing suspicious PE files, especially those received from untrusted sources, to reduce the likelihood of triggering the vulnerability. 5. Monitor endpoint protection logs and system stability for signs of scanning engine crashes or abnormal behavior that could indicate exploitation attempts. 6. Engage with F-Secure/WithSecure support channels to obtain any available patches or workarounds, even if not publicly linked, and apply them promptly. 7. Employ network-level protections such as email filtering, sandboxing, and intrusion detection systems to block or detect malicious PE files before reaching endpoints. 8. Develop incident response plans that include procedures for restoring endpoint protection services quickly in case of a DoS event. 9. Regularly update all security software and operating systems to reduce exposure to known vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Norway, Denmark, Poland, Italy
CVE-2022-28886: Denial of Service Vulnerability in F-Secure and WithSecure All F-Secure and WithSecure Endpoint Protection products for Windows running 32 bit operating system. F-Secure Linux Security 32 F-Secure Internet Gatekeeper
Description
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine
AI-Powered Analysis
Technical Analysis
CVE-2022-28886 is a Denial-of-Service (DoS) vulnerability affecting all versions of F-Secure and WithSecure Endpoint Protection products running on 32-bit Windows operating systems, as well as F-Secure Linux Security 32 and F-Secure Internet Gatekeeper. The vulnerability arises from the aerdl.so (Linux) and aerdl.dll (Windows) components responsible for unpacking Portable Executable (PE) files. Specifically, these components may enter an infinite loop when processing certain crafted PE files, causing the scanning engine to crash. This infinite loop condition is classified under CWE-835 (Loop with Unreachable Exit Condition), indicating a logic flaw that prevents normal termination of the loop. The vulnerability requires high privileges (PR:H) and user interaction (UI:R) to be exploited, with network attack vector (AV:N), meaning the attack can be performed remotely over the network. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects availability, as the scanning engine crash can disrupt endpoint protection services, potentially leaving systems unprotected against other threats. Confidentiality and integrity impacts are rated low. No known exploits are reported in the wild, and no patches or mitigations have been explicitly linked in the provided information. The vulnerability affects legacy 32-bit systems, which are less common but still present in some enterprise environments. The infinite loop in unpacking PE files could be triggered by maliciously crafted files delivered via email, downloads, or network shares, causing denial of service on endpoint protection components and possibly leading to gaps in malware detection and response.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of endpoint protection on affected 32-bit Windows and Linux systems. If exploited, the scanning engine crash could disable or degrade the effectiveness of F-Secure and WithSecure security products, increasing exposure to malware and other cyber threats. Organizations relying on these products for critical infrastructure protection, especially those with legacy 32-bit systems, may experience interruptions in security monitoring and incident response capabilities. This could be particularly impactful in sectors with high security requirements such as finance, healthcare, government, and critical infrastructure. The medium severity rating and requirement for high privileges and user interaction reduce the likelihood of widespread exploitation; however, targeted attacks against vulnerable systems remain a concern. The lack of known exploits in the wild suggests limited active exploitation but does not eliminate future risk. European organizations with mixed architectures that include legacy 32-bit endpoints should assess their exposure and consider the potential operational impact of endpoint protection failures.
Mitigation Recommendations
1. Inventory and identify all systems running 32-bit Windows and Linux versions of F-Secure and WithSecure endpoint products to assess exposure. 2. Where possible, upgrade affected systems to 64-bit operating systems and endpoint protection versions, as the vulnerability specifically affects 32-bit versions. 3. Implement strict access controls to limit high privilege accounts and reduce the risk of exploitation requiring elevated privileges. 4. Educate users to avoid opening or executing suspicious PE files, especially those received from untrusted sources, to reduce the likelihood of triggering the vulnerability. 5. Monitor endpoint protection logs and system stability for signs of scanning engine crashes or abnormal behavior that could indicate exploitation attempts. 6. Engage with F-Secure/WithSecure support channels to obtain any available patches or workarounds, even if not publicly linked, and apply them promptly. 7. Employ network-level protections such as email filtering, sandboxing, and intrusion detection systems to block or detect malicious PE files before reaching endpoints. 8. Develop incident response plans that include procedures for restoring endpoint protection services quickly in case of a DoS event. 9. Regularly update all security software and operating systems to reduce exposure to known vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- F-SecureUS
- Date Reserved
- 2022-04-08T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f6b520acd01a249264622
Added to database: 5/22/2025, 6:22:10 PM
Last enriched: 7/8/2025, 7:58:35 AM
Last updated: 8/8/2025, 12:07:21 AM
Views: 13
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.