Skip to main content

CVE-2024-1140: CWE-125 Out-of-bounds Read in Filseclab Twister Antivirus

Medium
VulnerabilityCVE-2024-1140cvecve-2024-1140cwe-125
Published: Tue Feb 13 2024 (02/13/2024, 15:05:22 UTC)
Source: CVE
Vendor/Project: Filseclab
Product: Twister Antivirus

Description

Twister Antivirus v8.17 is vulnerable to an Out-of-bounds Read vulnerability by triggering the 0x801120B8 IOCTL code of the filmfd.sys driver.

AI-Powered Analysis

AILast updated: 07/04/2025, 13:56:21 UTC

Technical Analysis

CVE-2024-1140 is an identified vulnerability in Filseclab's Twister Antivirus version 8.17, classified as an out-of-bounds read (CWE-125) within the filmfd.sys driver component. Specifically, the vulnerability is triggered by invoking the IOCTL code 0x801120B8. An out-of-bounds read occurs when a program reads data past the boundary of allocated memory, which can lead to information disclosure or system instability. In this case, the flaw resides in a kernel-mode driver, which typically operates with elevated privileges and direct hardware access, increasing the potential impact of exploitation. The CVSS v3.1 base score is 6.1, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with limited confidentiality impact (C:L), no integrity impact (I:N), and high availability impact (A:H), meaning exploitation could cause system crashes or denial of service. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in an antivirus driver is notable because antivirus software runs with high privileges and is trusted by the operating system, so vulnerabilities here can be particularly sensitive. However, exploitation requires local access and low privileges, which somewhat limits remote exploitation possibilities but still poses a risk in multi-user or compromised environments.

Potential Impact

For European organizations, this vulnerability could lead to denial-of-service conditions on endpoints running Twister Antivirus 8.17, potentially disrupting critical security monitoring and protection functions. The out-of-bounds read could cause system instability or crashes, impacting availability of protected systems. Although confidentiality impact is limited, the disruption of antivirus services could indirectly increase risk exposure to other malware or attacks. Organizations with multi-user environments or those that allow local user access to sensitive systems may be at higher risk. The requirement for local access and low privileges means that attackers would need some foothold on the system already, such as through social engineering or insider threats. Given the role of antivirus in defense-in-depth strategies, any disruption could degrade overall security posture. European organizations in sectors with strict uptime and security requirements, such as finance, healthcare, and critical infrastructure, may experience operational and compliance challenges if affected.

Mitigation Recommendations

Immediate mitigation should focus on restricting local access to systems running Twister Antivirus 8.17, ensuring that only trusted users have login permissions. Organizations should monitor for unusual system crashes or instability that could indicate exploitation attempts. Since no patch is currently available, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous behavior related to the filmfd.sys driver. Additionally, applying strict application whitelisting and privilege management can reduce the risk of local attackers exploiting this vulnerability. Network segmentation to isolate critical systems and limiting administrative privileges can further reduce exposure. Organizations should maintain up-to-date backups and have incident response plans ready to address potential denial-of-service impacts. Finally, maintain close communication with Filseclab for any forthcoming patches or advisories and plan for immediate deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2024-01-31T22:23:11.905Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb581

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 1:56:21 PM

Last updated: 8/17/2025, 11:42:43 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats