CVE-2024-4978: CWE-506 Embedded Malicious Code in Justice AV Solutions Viewer
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.
AI Analysis
Technical Summary
CVE-2024-4978 identifies a critical vulnerability in Justice AV Solutions Viewer version 8.3.7.250, where the installation package contains an embedded malicious binary signed with an unexpected Authenticode signature, indicating potential tampering or supply chain compromise. This malicious binary enables a remote attacker with privileged access to execute unauthorized PowerShell commands on the affected system. The vulnerability falls under CWE-506, which relates to embedded malicious code, highlighting the risk of hidden or disguised malware within legitimate software components. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), allowing attackers to potentially take full control of the system, exfiltrate sensitive data, or disrupt operations. Although no exploits have been reported in the wild yet, the presence of a malicious binary signed with an unexpected certificate raises concerns about software supply chain security and trustworthiness. This vulnerability is particularly dangerous in environments where Justice AV Solutions Viewer is used for critical justice or law enforcement operations, as unauthorized PowerShell execution can lead to severe operational disruptions or data breaches.
Potential Impact
For European organizations, especially those in the justice, law enforcement, and public safety sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive case files, manipulation or deletion of evidence, and disruption of critical judicial processes. The high impact on confidentiality, integrity, and availability means that attackers could gain persistent control over affected systems, potentially leading to data breaches, ransomware deployment, or sabotage of judicial workflows. The requirement for privileged access and user interaction somewhat limits the attack surface but does not eliminate the risk, particularly in environments where users have elevated privileges or where social engineering could be used to induce interaction. The unexpected Authenticode signature suggests a possible supply chain compromise, which could undermine trust in software updates and distribution channels, further complicating incident response and recovery efforts. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that the vulnerability should be treated with urgency.
Mitigation Recommendations
1. Verify the integrity and authenticity of Justice AV Solutions Viewer installation packages by checking digital signatures against known trusted certificates and sources. 2. Restrict PowerShell execution policies using Group Policy or local security policies to allow only signed scripts or disable PowerShell where not required. 3. Implement application whitelisting to prevent execution of unauthorized binaries, especially those embedded within software installers. 4. Enforce the principle of least privilege by limiting user accounts with administrative rights and monitoring privileged account activities closely. 5. Conduct thorough endpoint detection and response (EDR) monitoring for unusual PowerShell command execution or other suspicious behaviors associated with this vulnerability. 6. Engage with the vendor for patches or updated software versions and apply them promptly once available. 7. Educate users about the risks of executing software from untrusted sources and the importance of verifying software authenticity. 8. Consider network segmentation to isolate systems running Justice AV Solutions Viewer from critical infrastructure to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2024-4978: CWE-506 Embedded Malicious Code in Justice AV Solutions Viewer
Description
Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.
AI-Powered Analysis
Technical Analysis
CVE-2024-4978 identifies a critical vulnerability in Justice AV Solutions Viewer version 8.3.7.250, where the installation package contains an embedded malicious binary signed with an unexpected Authenticode signature, indicating potential tampering or supply chain compromise. This malicious binary enables a remote attacker with privileged access to execute unauthorized PowerShell commands on the affected system. The vulnerability falls under CWE-506, which relates to embedded malicious code, highlighting the risk of hidden or disguised malware within legitimate software components. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), allowing attackers to potentially take full control of the system, exfiltrate sensitive data, or disrupt operations. Although no exploits have been reported in the wild yet, the presence of a malicious binary signed with an unexpected certificate raises concerns about software supply chain security and trustworthiness. This vulnerability is particularly dangerous in environments where Justice AV Solutions Viewer is used for critical justice or law enforcement operations, as unauthorized PowerShell execution can lead to severe operational disruptions or data breaches.
Potential Impact
For European organizations, especially those in the justice, law enforcement, and public safety sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive case files, manipulation or deletion of evidence, and disruption of critical judicial processes. The high impact on confidentiality, integrity, and availability means that attackers could gain persistent control over affected systems, potentially leading to data breaches, ransomware deployment, or sabotage of judicial workflows. The requirement for privileged access and user interaction somewhat limits the attack surface but does not eliminate the risk, particularly in environments where users have elevated privileges or where social engineering could be used to induce interaction. The unexpected Authenticode signature suggests a possible supply chain compromise, which could undermine trust in software updates and distribution channels, further complicating incident response and recovery efforts. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that the vulnerability should be treated with urgency.
Mitigation Recommendations
1. Verify the integrity and authenticity of Justice AV Solutions Viewer installation packages by checking digital signatures against known trusted certificates and sources. 2. Restrict PowerShell execution policies using Group Policy or local security policies to allow only signed scripts or disable PowerShell where not required. 3. Implement application whitelisting to prevent execution of unauthorized binaries, especially those embedded within software installers. 4. Enforce the principle of least privilege by limiting user accounts with administrative rights and monitoring privileged account activities closely. 5. Conduct thorough endpoint detection and response (EDR) monitoring for unusual PowerShell command execution or other suspicious behaviors associated with this vulnerability. 6. Engage with the vendor for patches or updated software versions and apply them promptly once available. 7. Educate users about the risks of executing software from untrusted sources and the importance of verifying software authenticity. 8. Consider network segmentation to isolate systems running Justice AV Solutions Viewer from critical infrastructure to limit lateral movement in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2024-05-15T21:03:53.551Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b5247d717aace26bc1
Added to database: 10/21/2025, 7:06:29 PM
Last enriched: 10/21/2025, 7:25:09 PM
Last updated: 10/30/2025, 12:26:29 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.