The Nigerian Communications Commission (NCC) has called on telecom consumers and other ICT end-users to always enable automatic update features for AVAST and AVG antiviruses to prevent potential cyber vulnerabilities.
The commission’s computer security incident response team (CSIRT) stated this in a new advisory.
The advisory noted that cyber vulnerability in AVAST and AVG Antiviruses can lead to attacks on millions of devices with high impact in terms of consequences to the ICT user. The threat types as a result of this vulnerability are bypass authentication, remote code execution and unauthorised access while consequences range from privilege escalation, bypass security products, overwrite system components and corrupting the operating system.
According to CSIRT, researchers at SentinelOne security firm have discovered two potentially damaging vulnerabilities in AVAST and AVG antivirus products that allow attackers to escalate privileges enabling them to disable security products, overwrite system components, corrupt the operating system, or perform malicious operations unimpeded.
“Two vulnerabilities identified as CVE-2022-26522 and CVE-2022-26523 targeted the “Anti Rootkit” driver of Avast antivirus (also used by AVG) allowing an attacker with limited privileges on the targeted system to execute code in system mode (kernel mode) and take complete control of the device. Moreover, the vulnerabilities allow complete take-over of a device, even without privileges, due to the ability to execute code in kernel mode,” the CSIRT said in the advisory.
The cybersecurity centre offered tripartite measures that should be taken by internet/ICT users to prevent being vulnerable to the cyber threats. They include enabling automatic update feature for AVAST and AVG antiviruses, upgrading AVAST and AVG antiviruses to version 22.1.2504, as well as carrying out regular patch management.