CVE-2018-7289
Published on: 02/21/2018 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:24:39 PM UTC
Certain versions of Armadito Antivirus from Teclib-edition contain the following vulnerability:
An issue was discovered in armadito-windows-driver/src/communication.c in Armadito 0.12.7.2. Malware with filenames containing pure UTF-16 characters can bypass detection. The user-mode service will fail to open the file for scanning after the conversion is done from Unicode to ANSI. This happens because characters that cannot be converted from Unicode are replaced with '?' characters.
- CVE-2018-7289 has been assigned by
[email protected] to track the vulnerability - currently rated as LOW severity.
CVSS3 Score: 3.3 - LOW
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | LOW | NONE |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Armadito Antivirus 0.12.7.2 - Detection Bypass - Windows local Exploit | Exploit Third Party Advisory VDB Entry www.exploit-db.com Proof of Concept text/html |
![]() |
Malware with pure UTF-16 characters in the filename can bypass detection · Issue #5 · armadito/armadito-windows-driver · GitHub | Third Party Advisory github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Teclib-edition | Armadito Antivirus | 0.12.7.2 | All | All | All |
Application | Teclib-edition | Armadito Antivirus | 0.12.7.2 | All | All | All |
- cpe:2.3:a:teclib-edition:armadito_antivirus:0.12.7.2:*:*:*:*:*:*:*:
- cpe:2.3:a:teclib-edition:armadito_antivirus:0.12.7.2:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE