Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13990: CWE-295 Improper Certificate Validation in MicroWorld Technologies eScan AV

0
Critical
VulnerabilityCVE-2024-13990cvecve-2024-13990cwe-295cwe-347
Published: Fri Sep 19 2025 (09/19/2025, 18:54:08 UTC)
Source: CVE Database V5
Vendor/Project: MicroWorld Technologies
Product: eScan AV

Description

MicroWorld eScan AV's update mechanism failed to ensure authenticity and integrity of updates: update packages were delivered and accepted without robust cryptographic verification. As a result, an on-path attacker could perform a man-in-the-middle (MitM) attack and substitute malicious update payloads for legitimate ones. The eScan AV client accepted these substituted packages and executed or loaded their components (including sideloaded DLLs and Java/installer payloads), enabling remote code execution on affected systems. MicroWorld eScan confirmed remediation of the update mechanism on 2023-07-31 but versioning details are unavailable. NOTE: MicroWorld eScan disputes the characterization in third-party reports, stating the issue relates to 2018–2019 and that controls were implemented then.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:22:34 UTC

Technical Analysis

CVE-2024-13990 identifies a severe security vulnerability in MicroWorld Technologies' eScan Antivirus software, specifically related to its update mechanism's failure to properly validate the authenticity and integrity of update packages. The vulnerability stems from improper certificate validation (CWE-295) and insufficient verification of cryptographic signatures (CWE-347), allowing an attacker positioned on the network path between the client and update server to intercept and substitute legitimate update payloads with malicious ones. The eScan client, lacking robust cryptographic checks, accepts these malicious updates and executes their components, including sideloaded DLLs and Java or installer payloads, resulting in remote code execution (RCE) without requiring any user interaction or authentication. This flaw effectively enables attackers to gain full control over affected systems remotely. Although MicroWorld disputes the timeline and claims controls were implemented as early as 2018–2019, third-party reports and the recent CVE publication suggest the vulnerability persisted until a fix was confirmed in July 2023. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the critical nature and ease of exploitation make this a significant threat. The lack of detailed patch versioning information necessitates vigilance in applying updates and verifying vendor communications.

Potential Impact

For European organizations, this vulnerability poses a critical risk, especially for enterprises and government agencies relying on MicroWorld eScan AV for endpoint protection. Successful exploitation can lead to complete system compromise, data breaches, disruption of services, and potential lateral movement within networks. Sectors such as finance, healthcare, energy, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and operations. The ability to execute arbitrary code remotely without authentication or user interaction amplifies the threat, potentially enabling attackers to deploy ransomware, steal intellectual property, or disrupt essential services. Given the update mechanism is a trusted channel, attackers exploiting this flaw can bypass many traditional security controls. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is publicly disclosed with a high CVSS score, increasing the likelihood of future exploitation attempts targeting European entities.

Mitigation Recommendations

Organizations should immediately verify that their eScan AV installations are updated to the latest version where the update mechanism vulnerability has been remediated, as confirmed by MicroWorld in July 2023. Since detailed patch versioning is unavailable, direct communication with MicroWorld support is recommended to confirm patch status. Network-level mitigations include enforcing strict TLS inspection and certificate pinning where possible to detect and block MitM attempts on update traffic. Deploy network intrusion detection systems (NIDS) tuned to identify anomalous update package signatures or unexpected DLL loads. Implement application whitelisting to prevent execution of unauthorized binaries and monitor endpoint behavior for suspicious activity indicative of malicious update execution. Additionally, segment networks to limit the spread of potential compromises and maintain robust backup and recovery procedures. Regularly audit antivirus update logs and network traffic to ensure update integrity. Finally, educate security teams about this specific threat to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-09-18T16:06:40.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691dec83964c14ffeeaeeb01

Added to database: 11/19/2025, 4:12:51 PM

Last enriched: 11/19/2025, 4:22:34 PM

Last updated: 11/22/2025, 4:18:00 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats