Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4978: CWE-506 Embedded Malicious Code in Justice AV Solutions Viewer

0
High
VulnerabilityCVE-2024-4978cvecve-2024-4978cwe-506
Published: Thu May 23 2024 (05/23/2024, 01:56:37 UTC)
Source: CVE Database V5
Vendor/Project: Justice AV Solutions
Product: Viewer

Description

Justice AV Solutions Viewer Setup 8.3.7.250-1 contains a malicious binary when executed and is signed with an unexpected authenticode signature. A remote, privileged threat actor may exploit this vulnerability to execute of unauthorized PowerShell commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:34:29 UTC

Technical Analysis

CVE-2024-4978 identifies a critical vulnerability in Justice AV Solutions Viewer version 8.3.7.250, where the installation package contains an embedded malicious binary signed with an unexpected authenticode signature, indicating potential tampering or supply chain compromise. This malicious code allows a remote attacker with privileged access to execute unauthorized PowerShell commands on the affected system. The vulnerability falls under CWE-506, which involves embedded malicious code that can be executed to compromise system security. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires the attacker to have high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as arbitrary PowerShell command execution can lead to data theft, system manipulation, or denial of service. Although no exploits are currently known in the wild, the presence of malicious code in a signed installer suggests a serious supply chain risk. The vulnerability was published on May 23, 2024, and affects a specific version of the Justice AV Solutions Viewer, a product likely used in justice or law enforcement sectors. The unexpected authenticode signature raises concerns about the authenticity and trustworthiness of the software distribution channel. This vulnerability requires immediate attention to prevent potential exploitation by remote attackers who have already gained privileged access.

Potential Impact

The impact of CVE-2024-4978 is significant for organizations using Justice AV Solutions Viewer, particularly in justice, law enforcement, and related sectors where the software is deployed. Successful exploitation allows remote, privileged attackers to execute arbitrary PowerShell commands, which can lead to full system compromise, data exfiltration, manipulation of evidence or logs, and disruption of critical judicial or investigative processes. The embedded malicious code in a signed installer undermines trust in the software supply chain, potentially enabling attackers to distribute malware under the guise of legitimate software updates. This can result in widespread compromise if the affected version is broadly deployed. The high CVSS score reflects the potential for severe confidentiality, integrity, and availability impacts. Organizations may face operational disruption, legal consequences, and reputational damage if this vulnerability is exploited. The requirement for privileged access and user interaction somewhat limits exploitation but does not eliminate the risk, especially in environments where users have elevated permissions or where attackers have already gained footholds. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future attacks.

Mitigation Recommendations

1. Verify the authenticity and integrity of Justice AV Solutions Viewer installation files by checking digital signatures against vendor-provided certificates and hashes. 2. Avoid installing or updating to version 8.3.7.250 until a vendor patch or official fix is released. 3. Implement strict privilege management to minimize the number of users with high privileges capable of executing PowerShell commands. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block unauthorized PowerShell execution and suspicious binaries. 5. Monitor PowerShell logs and system event logs for unusual or unauthorized command execution patterns. 6. Isolate systems running Justice AV Solutions Viewer from untrusted networks to reduce exposure to remote attacks. 7. Engage with the vendor for timely updates or patches and follow their security advisories closely. 8. Conduct supply chain security assessments to ensure software distribution channels are secure and have not been compromised. 9. Educate users about the risks of executing untrusted software and the importance of reporting unexpected prompts or behaviors. 10. Prepare incident response plans specific to potential exploitation scenarios involving PowerShell command execution.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2024-05-15T21:03:53.551Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26bc1

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/27/2026, 10:34:29 PM

Last updated: 3/23/2026, 3:15:15 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses