Skip to main content

CVE-2022-28887: Multiple Denial-of-Service (DoS) vulnerability in F-Secure and WithSecure All F-Secure and WithSecure Endpoint Protection products for Windows & Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper

Medium
VulnerabilityCVE-2022-28887cvecve-2022-28887
Published: Wed Oct 12 2022 (10/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: F-Secure and WithSecure
Product: All F-Secure and WithSecure Endpoint Protection products for Windows & Mac F-Secure Linux Security (32-bit) F-Secure Linux Security (64-bit) F-Secure Atlant F-Secure Internet Gatekeeper

Description

Multiple Denial-of-Service (DoS) vulnerability was discovered in F-Secure & WithSecure products whereby the aerdl.dll unpacker handler function crashes. This can lead to a possible scanning engine crash.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:26:01 UTC

Technical Analysis

CVE-2022-28887 is a medium-severity Denial-of-Service (DoS) vulnerability affecting multiple F-Secure and WithSecure endpoint protection products across Windows, Mac, and Linux platforms, including F-Secure Linux Security (both 32-bit and 64-bit), F-Secure Atlant, and F-Secure Internet Gatekeeper. The vulnerability arises from a flaw in the aerdl.dll unpacker handler function within the scanning engine. Specifically, when processing certain inputs, this function can crash, leading to the scanning engine itself crashing. This crash results in a denial of service, temporarily disabling the endpoint protection capabilities of the affected product. The vulnerability is classified under CWE-404, which pertains to improper resource shutdown or release, indicating that the crash likely stems from mishandling of resources during unpacking operations. The CVSS v3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L, meaning the attack requires network access, low attack complexity, high privileges, and user interaction, and impacts confidentiality, integrity, and availability to a limited extent. No known exploits are reported in the wild, and no patches have been linked in the provided data, suggesting that mitigation may rely on vendor updates or workarounds. The vulnerability affects all versions of the listed products, indicating a broad exposure for users of these endpoint solutions.

Potential Impact

For European organizations, this vulnerability poses a risk of temporary disruption of endpoint protection services. Since the scanning engine can crash upon processing crafted inputs, attackers could exploit this to disable or degrade antivirus and endpoint security functions, potentially allowing malware or other threats to bypass detection during the downtime. This is particularly concerning for critical infrastructure, financial institutions, and enterprises with high security requirements that rely on F-Secure or WithSecure products for threat detection and prevention. The requirement for high privileges and user interaction limits the ease of exploitation but does not eliminate risk, especially in environments where privileged users might be targeted with social engineering or malicious files. The impact on confidentiality and integrity is limited but non-negligible, as disabling endpoint protection can facilitate further attacks. Availability is affected due to the DoS condition. Given the widespread use of these products in Europe, especially in Nordic countries where F-Secure has a strong market presence, the disruption potential is significant. However, the absence of known exploits and the medium severity rating suggest that immediate widespread attacks are unlikely but possible if attackers develop reliable exploit methods.

Mitigation Recommendations

Organizations should prioritize applying any official patches or updates released by F-Secure and WithSecure addressing CVE-2022-28887 once available. In the absence of patches, administrators should monitor endpoint protection logs for unusual crashes or scanning engine restarts indicative of exploitation attempts. Restricting high-privilege user interactions with untrusted files can reduce the risk, as exploitation requires user interaction with malicious content. Network segmentation and strict access controls can limit exposure to crafted inputs from external sources. Additionally, implementing layered security controls such as endpoint detection and response (EDR) tools, network intrusion detection systems (NIDS), and robust email and web filtering can help detect and block malicious payloads attempting to trigger the vulnerability. Regular security awareness training for privileged users to recognize phishing or malicious files is also recommended. Finally, organizations should maintain incident response readiness to quickly restore endpoint protection services if a DoS condition occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
F-SecureUS
Date Reserved
2022-04-08T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec470

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:26:01 PM

Last updated: 8/16/2025, 3:55:20 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats