CVE-2024-7236: CWE-59: Improper Link Resolution Before File Access ('Link Following') in AVG AntiVirus Free
AVG AntiVirus Free icarus Arbitrary File Creation Denial of Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Installer. By creating a symbolic link, an attacker can abuse the update functionality to create a file. An attacker can leverage this vulnerability to create a persistent denial-of-service condition on the system. Was ZDI-CAN-22942.
AI Analysis
Technical Summary
CVE-2024-7236 is a vulnerability identified in AVG AntiVirus Free version 23.12.8700.812, classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following'). The vulnerability resides in the AVG Installer component, specifically in its update mechanism. An attacker with the ability to execute low-privileged code locally can create a symbolic link that the installer follows improperly during its update process. This improper link resolution allows the attacker to create arbitrary files on the system, which can be leveraged to induce a persistent denial-of-service (DoS) condition. The attack vector requires local access and low-level code execution privileges but does not require user interaction. The vulnerability does not impact confidentiality but affects system integrity and availability by enabling file creation that disrupts normal operation. The CVSS v3.0 score is 5.3 (medium severity), reflecting the need for local privileges and the high complexity of attack conditions. No public exploits have been reported yet, but the vulnerability was tracked as ZDI-CAN-22942 before public disclosure. The lack of patches at the time of disclosure means affected users must rely on mitigations until an update is released.
Potential Impact
The primary impact of CVE-2024-7236 is the potential for a persistent denial-of-service condition on systems running the affected AVG AntiVirus Free version. By exploiting this vulnerability, an attacker can disrupt the antivirus update process or other system functions relying on the installer, potentially degrading endpoint security posture. This can lead to reduced system availability and increased risk exposure if antivirus updates fail or the system becomes unstable. Since exploitation requires local code execution with low privileges, the threat is most significant in environments where attackers have already gained limited access, such as through compromised user accounts or malware. The vulnerability does not expose sensitive data or allow privilege escalation directly but can be part of a multi-stage attack chain. Organizations relying heavily on AVG AntiVirus Free for endpoint protection may experience operational disruptions and increased risk of further compromise if this vulnerability is exploited.
Mitigation Recommendations
1. Restrict local access: Limit the ability of untrusted users or processes to execute code on systems running AVG AntiVirus Free, especially on endpoints with sensitive data or critical functions. 2. Monitor and control symbolic link creation: Employ host-based intrusion detection or endpoint protection tools that can detect suspicious symbolic link creation or manipulation activities. 3. Apply principle of least privilege: Ensure users and applications operate with the minimum necessary privileges to reduce the risk of local code execution leading to exploitation. 4. Isolate update processes: Where possible, run antivirus update processes in restricted environments or sandboxes to prevent abuse of installer functionality. 5. Stay updated: Monitor AVG vendor advisories and apply patches or updates promptly once available to remediate the vulnerability. 6. Incident response readiness: Prepare to detect and respond to denial-of-service conditions related to antivirus failures, including fallback mechanisms for endpoint protection. 7. Employ application whitelisting and code integrity policies to prevent unauthorized code execution that could lead to exploitation.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Brazil, India, Japan
CVE-2024-7236: CWE-59: Improper Link Resolution Before File Access ('Link Following') in AVG AntiVirus Free
Description
AVG AntiVirus Free icarus Arbitrary File Creation Denial of Service Vulnerability. This vulnerability allows local attackers to create a denial-of-service condition on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Installer. By creating a symbolic link, an attacker can abuse the update functionality to create a file. An attacker can leverage this vulnerability to create a persistent denial-of-service condition on the system. Was ZDI-CAN-22942.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-7236 is a vulnerability identified in AVG AntiVirus Free version 23.12.8700.812, classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following'). The vulnerability resides in the AVG Installer component, specifically in its update mechanism. An attacker with the ability to execute low-privileged code locally can create a symbolic link that the installer follows improperly during its update process. This improper link resolution allows the attacker to create arbitrary files on the system, which can be leveraged to induce a persistent denial-of-service (DoS) condition. The attack vector requires local access and low-level code execution privileges but does not require user interaction. The vulnerability does not impact confidentiality but affects system integrity and availability by enabling file creation that disrupts normal operation. The CVSS v3.0 score is 5.3 (medium severity), reflecting the need for local privileges and the high complexity of attack conditions. No public exploits have been reported yet, but the vulnerability was tracked as ZDI-CAN-22942 before public disclosure. The lack of patches at the time of disclosure means affected users must rely on mitigations until an update is released.
Potential Impact
The primary impact of CVE-2024-7236 is the potential for a persistent denial-of-service condition on systems running the affected AVG AntiVirus Free version. By exploiting this vulnerability, an attacker can disrupt the antivirus update process or other system functions relying on the installer, potentially degrading endpoint security posture. This can lead to reduced system availability and increased risk exposure if antivirus updates fail or the system becomes unstable. Since exploitation requires local code execution with low privileges, the threat is most significant in environments where attackers have already gained limited access, such as through compromised user accounts or malware. The vulnerability does not expose sensitive data or allow privilege escalation directly but can be part of a multi-stage attack chain. Organizations relying heavily on AVG AntiVirus Free for endpoint protection may experience operational disruptions and increased risk of further compromise if this vulnerability is exploited.
Mitigation Recommendations
1. Restrict local access: Limit the ability of untrusted users or processes to execute code on systems running AVG AntiVirus Free, especially on endpoints with sensitive data or critical functions. 2. Monitor and control symbolic link creation: Employ host-based intrusion detection or endpoint protection tools that can detect suspicious symbolic link creation or manipulation activities. 3. Apply principle of least privilege: Ensure users and applications operate with the minimum necessary privileges to reduce the risk of local code execution leading to exploitation. 4. Isolate update processes: Where possible, run antivirus update processes in restricted environments or sandboxes to prevent abuse of installer functionality. 5. Stay updated: Monitor AVG vendor advisories and apply patches or updates promptly once available to remediate the vulnerability. 6. Incident response readiness: Prepare to detect and respond to denial-of-service conditions related to antivirus failures, including fallback mechanisms for endpoint protection. 7. Employ application whitelisting and code integrity policies to prevent unauthorized code execution that could lead to exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-07-29T20:26:49.635Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6c12b7ef31ef0b55f9b8
Added to database: 2/25/2026, 9:39:30 PM
Last enriched: 2/26/2026, 3:32:46 AM
Last updated: 4/12/2026, 3:38:09 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.