CVE-2024-1140: CWE-125 Out-of-bounds Read in Filseclab Twister Antivirus
Twister Antivirus v8.17 is vulnerable to an Out-of-bounds Read vulnerability by triggering the 0x801120B8 IOCTL code of the filmfd.sys driver.
AI Analysis
Technical Summary
CVE-2024-1140 is an identified vulnerability in Filseclab's Twister Antivirus version 8.17, classified as an out-of-bounds read (CWE-125) within the filmfd.sys driver component. Specifically, the vulnerability is triggered by invoking the IOCTL code 0x801120B8. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, which can lead to information disclosure or system instability. In this case, the flaw resides in a kernel-mode driver, which typically operates with elevated privileges and direct hardware access, increasing the potential impact of exploitation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with limited confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H), meaning exploitation could cause system crashes or denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in an antivirus driver is notable because antivirus software runs with high privileges and is trusted by the operating system, so vulnerabilities here can be particularly sensitive. However, exploitation requires local access and low privileges, which somewhat limits remote exploitation possibilities but still poses a risk in multi-user or compromised environments.
Potential Impact
For European organizations, this vulnerability could lead to denial-of-service conditions on endpoints running Twister Antivirus 8.17, potentially disrupting critical security monitoring and protection functions. The out-of-bounds read could cause system instability or crashes, impacting availability of protected systems. Although confidentiality impact is limited, the disruption of antivirus services could indirectly increase risk exposure to other malware or attacks. Organizations with multi-user environments or those that allow local user access to sensitive systems may be at higher risk. The requirement for local access and low privileges means that attackers would need some foothold on the system already, such as through social engineering or insider threats. Given the role of antivirus in defense-in-depth strategies, any disruption could degrade overall security posture. European organizations in sectors with strict uptime and security requirements, such as finance, healthcare, and critical infrastructure, may experience operational and compliance challenges if affected.
Mitigation Recommendations
Immediate mitigation should focus on restricting local access to systems running Twister Antivirus 8.17, ensuring that only trusted users have login permissions. Organizations should monitor for unusual system crashes or instability that could indicate exploitation attempts. Since no patch is currently available, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous behavior related to the filmfd.sys driver. Additionally, applying strict application whitelisting and privilege management can reduce the risk of local attackers exploiting this vulnerability. Network segmentation to isolate critical systems and limiting administrative privileges can further reduce exposure. Organizations should maintain up-to-date backups and have incident response plans ready to address potential denial-of-service impacts. Finally, maintain close communication with Filseclab for any forthcoming patches or advisories and plan for immediate deployment once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-1140: CWE-125 Out-of-bounds Read in Filseclab Twister Antivirus
Description
Twister Antivirus v8.17 is vulnerable to an Out-of-bounds Read vulnerability by triggering the 0x801120B8 IOCTL code of the filmfd.sys driver.
AI-Powered Analysis
Technical Analysis
CVE-2024-1140 is an identified vulnerability in Filseclab's Twister Antivirus version 8.17, classified as an out-of-bounds read (CWE-125) within the filmfd.sys driver component. Specifically, the vulnerability is triggered by invoking the IOCTL code 0x801120B8. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, which can lead to information disclosure or system instability. In this case, the flaw resides in a kernel-mode driver, which typically operates with elevated privileges and direct hardware access, increasing the potential impact of exploitation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with limited confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H), meaning exploitation could cause system crashes or denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in an antivirus driver is notable because antivirus software runs with high privileges and is trusted by the operating system, so vulnerabilities here can be particularly sensitive. However, exploitation requires local access and low privileges, which somewhat limits remote exploitation possibilities but still poses a risk in multi-user or compromised environments.
Potential Impact
For European organizations, this vulnerability could lead to denial-of-service conditions on endpoints running Twister Antivirus 8.17, potentially disrupting critical security monitoring and protection functions. The out-of-bounds read could cause system instability or crashes, impacting availability of protected systems. Although confidentiality impact is limited, the disruption of antivirus services could indirectly increase risk exposure to other malware or attacks. Organizations with multi-user environments or those that allow local user access to sensitive systems may be at higher risk. The requirement for local access and low privileges means that attackers would need some foothold on the system already, such as through social engineering or insider threats. Given the role of antivirus in defense-in-depth strategies, any disruption could degrade overall security posture. European organizations in sectors with strict uptime and security requirements, such as finance, healthcare, and critical infrastructure, may experience operational and compliance challenges if affected.
Mitigation Recommendations
Immediate mitigation should focus on restricting local access to systems running Twister Antivirus 8.17, ensuring that only trusted users have login permissions. Organizations should monitor for unusual system crashes or instability that could indicate exploitation attempts. Since no patch is currently available, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous behavior related to the filmfd.sys driver. Additionally, applying strict application whitelisting and privilege management can reduce the risk of local attackers exploiting this vulnerability. Network segmentation to isolate critical systems and limiting administrative privileges can further reduce exposure. Organizations should maintain up-to-date backups and have incident response plans ready to address potential denial-of-service impacts. Finally, maintain close communication with Filseclab for any forthcoming patches or advisories and plan for immediate deployment once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2024-01-31T22:23:11.905Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb581
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 1:56:21 PM
Last updated: 8/17/2025, 11:42:43 PM
Views: 19
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.