CVE-2024-7228: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Avast Free Antivirus
Avast Free Antivirus Link Following Denial-of-Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to create a folder. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-22806.
AI Analysis
Technical Summary
CVE-2024-7228 is a vulnerability identified in Avast Free Antivirus, specifically affecting versions from 23.11.6090 up to 23.11.8365.809. The flaw is categorized under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' The vulnerability arises within the Avast Service component, which improperly handles symbolic links created by a local attacker. By crafting a symbolic link, an attacker with the ability to execute low-privileged code on the target system can trick the Avast Service into creating folders at arbitrary locations. This behavior can be leveraged to induce a denial-of-service condition, potentially disrupting the normal operation of the antivirus software or the system itself. The attack vector requires local access with low privileges but does not require user interaction. The vulnerability does not impact confidentiality but affects integrity and availability, as it can interfere with system or application stability. The CVSS v3.0 base score is 6.1, reflecting a medium severity level, with metrics indicating local attack vector, low complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in late July 2024 and published in November 2024. No patches or mitigation links were provided at the time of this report, indicating that users should monitor vendor advisories closely.
Potential Impact
The primary impact of CVE-2024-7228 is the potential for denial-of-service conditions on systems running affected versions of Avast Free Antivirus. By exploiting the improper link resolution, an attacker can cause the antivirus service to malfunction or consume resources by creating folders in unintended locations, potentially leading to system instability or degraded antivirus functionality. This can reduce the effectiveness of endpoint protection, increasing the risk of further compromise. Since exploitation requires local code execution, the threat is primarily to environments where attackers can gain initial footholds with limited privileges, such as through phishing, malware, or insider threats. The lack of confidentiality impact limits data exposure risks, but the integrity and availability impacts can disrupt business operations, especially in environments heavily reliant on Avast Free Antivirus for endpoint security. Organizations with many endpoints running the affected versions may experience widespread service disruptions if exploited at scale. The absence of known exploits reduces immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2024-7228, organizations should implement the following specific measures: 1) Restrict local user permissions rigorously to prevent unauthorized code execution at low privilege levels, using least privilege principles and application whitelisting where possible. 2) Monitor and audit filesystem changes, particularly symbolic link creation, to detect suspicious activity indicative of exploitation attempts. 3) Temporarily disable or limit the Avast Service's ability to follow symbolic links if configurable, or isolate antivirus services in hardened environments. 4) Maintain up-to-date backups and system snapshots to recover quickly from potential denial-of-service impacts. 5) Closely monitor Avast vendor communications for patches or updates addressing this vulnerability and apply them promptly upon release. 6) Employ endpoint detection and response (EDR) tools to identify and block local privilege escalation or code execution attempts that could lead to exploitation. 7) Educate users and administrators about the risks of executing untrusted code locally, reducing the likelihood of initial compromise. These targeted actions go beyond generic advice by focusing on controlling local access vectors and monitoring symbolic link manipulations specific to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Brazil, India, Russia, China, South Korea, Japan, Canada, Australia
CVE-2024-7228: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Avast Free Antivirus
Description
Avast Free Antivirus Link Following Denial-of-Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to create a folder. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-22806.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7228 is a vulnerability identified in Avast Free Antivirus, specifically affecting versions from 23.11.6090 up to 23.11.8365.809. The flaw is categorized under CWE-59, which pertains to improper link resolution before file access, commonly known as 'link following.' The vulnerability arises within the Avast Service component, which improperly handles symbolic links created by a local attacker. By crafting a symbolic link, an attacker with the ability to execute low-privileged code on the target system can trick the Avast Service into creating folders at arbitrary locations. This behavior can be leveraged to induce a denial-of-service condition, potentially disrupting the normal operation of the antivirus software or the system itself. The attack vector requires local access with low privileges but does not require user interaction. The vulnerability does not impact confidentiality but affects integrity and availability, as it can interfere with system or application stability. The CVSS v3.0 base score is 6.1, reflecting a medium severity level, with metrics indicating local attack vector, low complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and high availability impact. No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in late July 2024 and published in November 2024. No patches or mitigation links were provided at the time of this report, indicating that users should monitor vendor advisories closely.
Potential Impact
The primary impact of CVE-2024-7228 is the potential for denial-of-service conditions on systems running affected versions of Avast Free Antivirus. By exploiting the improper link resolution, an attacker can cause the antivirus service to malfunction or consume resources by creating folders in unintended locations, potentially leading to system instability or degraded antivirus functionality. This can reduce the effectiveness of endpoint protection, increasing the risk of further compromise. Since exploitation requires local code execution, the threat is primarily to environments where attackers can gain initial footholds with limited privileges, such as through phishing, malware, or insider threats. The lack of confidentiality impact limits data exposure risks, but the integrity and availability impacts can disrupt business operations, especially in environments heavily reliant on Avast Free Antivirus for endpoint security. Organizations with many endpoints running the affected versions may experience widespread service disruptions if exploited at scale. The absence of known exploits reduces immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate CVE-2024-7228, organizations should implement the following specific measures: 1) Restrict local user permissions rigorously to prevent unauthorized code execution at low privilege levels, using least privilege principles and application whitelisting where possible. 2) Monitor and audit filesystem changes, particularly symbolic link creation, to detect suspicious activity indicative of exploitation attempts. 3) Temporarily disable or limit the Avast Service's ability to follow symbolic links if configurable, or isolate antivirus services in hardened environments. 4) Maintain up-to-date backups and system snapshots to recover quickly from potential denial-of-service impacts. 5) Closely monitor Avast vendor communications for patches or updates addressing this vulnerability and apply them promptly upon release. 6) Employ endpoint detection and response (EDR) tools to identify and block local privilege escalation or code execution attempts that could lead to exploitation. 7) Educate users and administrators about the risks of executing untrusted code locally, reducing the likelihood of initial compromise. These targeted actions go beyond generic advice by focusing on controlling local access vectors and monitoring symbolic link manipulations specific to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-07-29T20:22:57.091Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c10b7ef31ef0b55f90e
Added to database: 2/25/2026, 9:39:28 PM
Last enriched: 2/28/2026, 1:37:48 AM
Last updated: 4/12/2026, 5:56:14 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.