Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8351: CWE-122 Heap-based Buffer Overflow in Avast Antivirus

0
Critical
VulnerabilityCVE-2025-8351cvecve-2025-8351cwe-122cwe-125
Published: Mon Dec 01 2025 (12/01/2025, 15:51:42 UTC)
Source: CVE Database V5
Vendor/Project: Avast
Product: Antivirus

Description

Heap-based Buffer Overflow, Out-of-bounds Read vulnerability in Avast Antivirus on MacOS when scanning a malformed file may allow Local Execution of Code or Denial-of-Service of the anitvirus engine process.This issue affects Antivirus: from 8.3.70.94 before 8.3.70.98.

AI-Powered Analysis

AILast updated: 12/01/2025, 16:20:21 UTC

Technical Analysis

CVE-2025-8351 is a heap-based buffer overflow vulnerability classified under CWE-122 and CWE-125, discovered in Avast Antivirus for MacOS versions starting from 8.3.70.94 and fixed in versions after 8.3.70.98. The vulnerability occurs during the scanning of malformed files, where improper bounds checking leads to out-of-bounds reads and writes on the heap. This memory corruption can be exploited by an attacker to execute arbitrary code locally or cause a denial-of-service by crashing the antivirus engine process. The flaw does not require any privileges or user interaction, but the attack complexity is high, likely due to the need to craft a specific malformed file that triggers the overflow reliably. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could allow an attacker to bypass security controls or disrupt antivirus operations. The CVSS 3.1 score is 9.0 (critical), with vector AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating network attack vector, high complexity, no privileges or user interaction, and scope change with high impact on confidentiality, integrity, and availability. No public exploits or active exploitation have been reported yet, but the critical nature demands immediate attention. Avast users on MacOS should monitor for patches and apply updates promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on Avast Antivirus on MacOS endpoints. Successful exploitation could lead to local code execution, allowing attackers to disable or manipulate antivirus defenses, potentially facilitating further compromise or data exfiltration. The denial-of-service impact could disrupt endpoint protection, leaving systems exposed to other threats. Given the critical CVSS score and the potential for scope change, the vulnerability threatens the confidentiality, integrity, and availability of affected systems. Organizations in sectors with high MacOS usage such as finance, technology, and government are particularly vulnerable. The lack of required privileges or user interaction lowers the barrier for exploitation once a malicious file is introduced, increasing risk in environments where file sharing or downloads are common. The absence of known exploits in the wild provides a window for proactive mitigation, but the critical severity necessitates urgent patching and monitoring.

Mitigation Recommendations

1. Immediately monitor Avast’s official channels for the release of a security patch addressing CVE-2025-8351 and apply updates to all MacOS endpoints running affected versions. 2. Until patches are available, implement strict file handling policies to limit exposure to untrusted or malformed files, including disabling automatic scanning of files from unverified sources. 3. Employ network-level controls to restrict the transfer of potentially malicious files, such as email filtering and web proxy scanning. 4. Use endpoint detection and response (EDR) tools to monitor for unusual behavior indicative of exploitation attempts, such as crashes or unexpected process terminations of the antivirus engine. 5. Conduct user awareness training focused on safe file handling practices to reduce the likelihood of introducing malformed files. 6. Consider deploying additional layers of security on MacOS devices, such as application whitelisting and sandboxing, to limit the impact of potential code execution. 7. Regularly audit and inventory MacOS systems to ensure no outdated Avast versions remain in use. 8. Collaborate with Avast support for guidance and incident response readiness in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NLOK
Date Reserved
2025-07-30T11:48:44.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692dbca6f910530b0eb80df9

Added to database: 12/1/2025, 4:04:54 PM

Last enriched: 12/1/2025, 4:20:21 PM

Last updated: 12/4/2025, 3:42:40 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats