CVE-2024-0788: CWE-96: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') in SUPERAntiSpyware SUPERAntiSpyware Pro X
SUPERAntiSpyware Pro X v10.0.1260 is vulnerable to kernel-level API parameters manipulation and Denial of Service vulnerabilities by triggering the 0x9C402140 IOCTL code of the saskutil64.sys driver.
AI Analysis
Technical Summary
CVE-2024-0788 is a medium-severity vulnerability affecting SUPERAntiSpyware Pro X version 10.0.1260. The vulnerability stems from improper neutralization of directives in statically saved code, classified under CWE-96, which relates to static code injection. Specifically, the flaw exists in the kernel-mode driver saskutil64.sys, where manipulation of kernel-level API parameters is possible by triggering the IOCTL code 0x9C402140. This can lead to denial of service (DoS) conditions and potentially other impacts due to the ability to manipulate kernel API parameters. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the system to exploit it. The vulnerability impacts confidentiality and integrity to a limited extent (C:L, I:L) but has a high impact on availability (A:H), primarily through DoS. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is significant because it affects a security product that operates at the kernel level, which typically has elevated privileges and access to critical system resources. Exploitation could allow an attacker to disrupt system stability or potentially escalate privileges if combined with other vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running SUPERAntiSpyware Pro X version 10.0.1260. Given that the product is an anti-spyware tool, it is likely deployed in environments concerned with endpoint security, including enterprises and possibly government agencies. A successful exploitation could lead to denial of service on affected endpoints, disrupting security monitoring and potentially exposing systems to further attacks due to reduced protection. The local attack vector means that attackers would need some form of access, such as through compromised user accounts or insider threats. The medium severity suggests that while the vulnerability is not trivial, it is not critical, but it still requires timely attention to avoid operational disruptions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public. In sectors with high security requirements, such as finance, healthcare, and critical infrastructure in Europe, the impact could be more pronounced due to the reliance on endpoint security tools and regulatory requirements for system availability and integrity.
Mitigation Recommendations
European organizations should take several specific steps to mitigate this vulnerability: 1) Inventory all systems running SUPERAntiSpyware Pro X and identify those on version 10.0.1260. 2) Limit local access to systems with this software installed, enforcing strict access controls and monitoring for suspicious local activity. 3) Implement application whitelisting and endpoint detection to identify attempts to trigger unusual IOCTL calls or kernel driver manipulations. 4) Monitor system stability and logs for signs of denial of service or kernel driver anomalies related to saskutil64.sys. 5) Engage with the vendor for updates or patches and apply them promptly once available. 6) Consider deploying additional endpoint protection layers that can detect or prevent kernel-level manipulations. 7) Educate users and administrators about the risk of local privilege abuse and enforce least privilege principles to reduce the attack surface. These measures go beyond generic advice by focusing on controlling local access, monitoring kernel driver behavior, and preparing for patch deployment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2024-0788: CWE-96: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') in SUPERAntiSpyware SUPERAntiSpyware Pro X
Description
SUPERAntiSpyware Pro X v10.0.1260 is vulnerable to kernel-level API parameters manipulation and Denial of Service vulnerabilities by triggering the 0x9C402140 IOCTL code of the saskutil64.sys driver.
AI-Powered Analysis
Technical Analysis
CVE-2024-0788 is a medium-severity vulnerability affecting SUPERAntiSpyware Pro X version 10.0.1260. The vulnerability stems from improper neutralization of directives in statically saved code, classified under CWE-96, which relates to static code injection. Specifically, the flaw exists in the kernel-mode driver saskutil64.sys, where manipulation of kernel-level API parameters is possible by triggering the IOCTL code 0x9C402140. This can lead to denial of service (DoS) conditions and potentially other impacts due to the ability to manipulate kernel API parameters. The vulnerability requires local access with low privileges (PR:L) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning an attacker must have some level of access to the system to exploit it. The vulnerability impacts confidentiality and integrity to a limited extent (C:L, I:L) but has a high impact on availability (A:H), primarily through DoS. No known exploits are currently in the wild, and no patches have been published yet. The vulnerability is significant because it affects a security product that operates at the kernel level, which typically has elevated privileges and access to critical system resources. Exploitation could allow an attacker to disrupt system stability or potentially escalate privileges if combined with other vulnerabilities.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running SUPERAntiSpyware Pro X version 10.0.1260. Given that the product is an anti-spyware tool, it is likely deployed in environments concerned with endpoint security, including enterprises and possibly government agencies. A successful exploitation could lead to denial of service on affected endpoints, disrupting security monitoring and potentially exposing systems to further attacks due to reduced protection. The local attack vector means that attackers would need some form of access, such as through compromised user accounts or insider threats. The medium severity suggests that while the vulnerability is not trivial, it is not critical, but it still requires timely attention to avoid operational disruptions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details are public. In sectors with high security requirements, such as finance, healthcare, and critical infrastructure in Europe, the impact could be more pronounced due to the reliance on endpoint security tools and regulatory requirements for system availability and integrity.
Mitigation Recommendations
European organizations should take several specific steps to mitigate this vulnerability: 1) Inventory all systems running SUPERAntiSpyware Pro X and identify those on version 10.0.1260. 2) Limit local access to systems with this software installed, enforcing strict access controls and monitoring for suspicious local activity. 3) Implement application whitelisting and endpoint detection to identify attempts to trigger unusual IOCTL calls or kernel driver manipulations. 4) Monitor system stability and logs for signs of denial of service or kernel driver anomalies related to saskutil64.sys. 5) Engage with the vendor for updates or patches and apply them promptly once available. 6) Consider deploying additional endpoint protection layers that can detect or prevent kernel-level manipulations. 7) Educate users and administrators about the risk of local privilege abuse and enforce least privilege principles to reduce the attack surface. These measures go beyond generic advice by focusing on controlling local access, monitoring kernel driver behavior, and preparing for patch deployment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2024-01-22T17:22:53.162Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaff9
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 11:12:19 AM
Last updated: 8/15/2025, 8:18:08 AM
Views: 17
Related Threats
CVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.