Skip to main content

CVE-2024-0788: CWE-96: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') in SUPERAntiSpyware SUPERAntiSpyware Pro X

Medium
VulnerabilityCVE-2024-0788cvecve-2024-0788cwe-96
Published: Mon Jan 29 2024 (01/29/2024, 16:20:53 UTC)
Source: CVE
Vendor/Project: SUPERAntiSpyware
Product: SUPERAntiSpyware Pro X

Description

SUPERAntiSpyware Pro X v10.0.1260 is vulnerable to kernel-level API parameters manipulation and Denial of Service vulnerabilities by triggering the 0x9C402140 IOCTL code of the saskutil64.sys driver.

AI-Powered Analysis

AILast updated: 07/04/2025, 11:12:19 UTC

Technical Analysis

CVE-2024-0788 is a medium-severity vulnerability affecting SUPERAntiSpyware Pro X version 10.0.1260. The vulnerability stems from improper neutralization of directives in statically saved code, classified under CWE-96, which relates to static code injection. Specifically, the flaw exists in the kernel-mode driver saskutil64.sys, where manipulation of kernel-level API parameters is possible by triggering the IOCTL code 0x9C402140. This can lead to denial of service (DoS) conditions and potentially other impacts due to the ability to manipulate kernel API parameters. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the system to exploit it. The vulnerability impacts confidentiality and integrity to a limited extent (C:L, I:L) but has a high impact on availability (A:H), primarily through DoS. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is significant because it affects a security product that operates at the kernel level, which typically has elevated privileges and access to critical system resources. Exploitation could allow an attacker to disrupt system stability or potentially escalate privileges if combined with other vulnerabilities.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running SUPERAntiSpyware Pro X version 10.0.1260. Given that the product is an anti-spyware tool, it is likely deployed in environments concerned with endpoint security, including enterprises and possibly government agencies. A successful exploitation could lead to denial of service on affected endpoints, disrupting security monitoring and potentially exposing systems to further attacks due to reduced protection. The local attack vector means that attackers would need some form of access, such as through compromised user accounts or insider threats. The medium severity suggests that while the vulnerability is not trivial, it is not critical, but it still requires timely attention to avoid operational disruptions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public. In sectors with high security requirements, such as finance, healthcare, and critical infrastructure in Europe, the impact could be more pronounced due to the reliance on endpoint security tools and regulatory requirements for system availability and integrity.

Mitigation Recommendations

European organizations should take several specific steps to mitigate this vulnerability: 1) Inventory all systems running SUPERAntiSpyware Pro X and identify those on version 10.0.1260. 2) Limit local access to systems with this software installed, enforcing strict access controls and monitoring for suspicious local activity. 3) Implement application whitelisting and endpoint detection to identify attempts to trigger unusual IOCTL calls or kernel driver manipulations. 4) Monitor system stability and logs for signs of denial of service or kernel driver anomalies related to saskutil64.sys. 5) Engage with the vendor for updates or patches and apply them promptly once available. 6) Consider deploying additional endpoint protection layers that can detect or prevent kernel-level manipulations. 7) Educate users and administrators about the risk of local privilege abuse and enforce least privilege principles to reduce the attack surface. These measures go beyond generic advice by focusing on controlling local access, monitoring kernel driver behavior, and preparing for patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2024-01-22T17:22:53.162Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaff9

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 11:12:19 AM

Last updated: 8/15/2025, 8:18:08 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats