Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4978: CWE-506 Embedded Malicious Code in Justice AV Solutions Viewer

0
High
VulnerabilityCVE-2024-4978cvecve-2024-4978cwe-506
Published: Thu May 23 2024 (05/23/2024, 01:56:37 UTC)
Source: CVE Database V5
Vendor/Project: Justice AV Solutions
Product: Viewer

Description

Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:25:09 UTC

Technical Analysis

CVE-2024-4978 identifies a critical vulnerability in Justice AV Solutions Viewer version 8.3.7.250, where the installation package contains an embedded malicious binary signed with an unexpected Authenticode signature, indicating potential tampering or supply chain compromise. This malicious binary enables a remote attacker with privileged access to execute unauthorized PowerShell commands on the affected system. The vulnerability falls under CWE-506, which relates to embedded malicious code, highlighting the risk of hidden or disguised malware within legitimate software components. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:R), and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), allowing attackers to potentially take full control of the system, exfiltrate sensitive data, or disrupt operations. Although no exploits have been reported in the wild yet, the presence of a malicious binary signed with an unexpected certificate raises concerns about software supply chain security and trustworthiness. This vulnerability is particularly dangerous in environments where Justice AV Solutions Viewer is used for critical justice or law enforcement operations, as unauthorized PowerShell execution can lead to severe operational disruptions or data breaches.

Potential Impact

For European organizations, especially those in the justice, law enforcement, and public safety sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive case files, manipulation or deletion of evidence, and disruption of critical judicial processes. The high impact on confidentiality, integrity, and availability means that attackers could gain persistent control over affected systems, potentially leading to data breaches, ransomware deployment, or sabotage of judicial workflows. The requirement for privileged access and user interaction somewhat limits the attack surface but does not eliminate the risk, particularly in environments where users have elevated privileges or where social engineering could be used to induce interaction. The unexpected Authenticode signature suggests a possible supply chain compromise, which could undermine trust in software updates and distribution channels, further complicating incident response and recovery efforts. The absence of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that the vulnerability should be treated with urgency.

Mitigation Recommendations

1. Verify the integrity and authenticity of Justice AV Solutions Viewer installation packages by checking digital signatures against known trusted certificates and sources. 2. Restrict PowerShell execution policies using Group Policy or local security policies to allow only signed scripts or disable PowerShell where not required. 3. Implement application whitelisting to prevent execution of unauthorized binaries, especially those embedded within software installers. 4. Enforce the principle of least privilege by limiting user accounts with administrative rights and monitoring privileged account activities closely. 5. Conduct thorough endpoint detection and response (EDR) monitoring for unusual PowerShell command execution or other suspicious behaviors associated with this vulnerability. 6. Engage with the vendor for patches or updated software versions and apply them promptly once available. 7. Educate users about the risks of executing software from untrusted sources and the importance of verifying software authenticity. 8. Consider network segmentation to isolate systems running Justice AV Solutions Viewer from critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2024-05-15T21:03:53.551Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26bc1

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 10/21/2025, 7:25:09 PM

Last updated: 10/30/2025, 12:26:29 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats