Description
The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94.
Published: 2026-05-08
Score: n/a
EPSS: 1.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The socket connection handler in the aswArPot.sys component of the Avast and AVG Windows Anti Rootkit driver contains a double‑fetch condition, a race‑condition flaw (CWE‑362) that can be triggered by a local attacker. The double‑fetch allows a user with local privileges to read a value before it is altered, leading to memory corruption. The corruption can then be leveraged to execute arbitrary code in kernel mode or to cause a memory fault that crashes the operating system. Since the exploitation occurs in kernel space, a successful attack effectively compromises the entire system.

Affected Systems

Both Avast and AVG provide a Windows Anti Rootkit driver that includes the aswArPot.sys module. Versions of these drivers released before the 22.1 update are vulnerable. The flaw specifically targets the socket connection handling routine at the offset 0xbb94 within the driver.

Risk and Exploitability

The vulnerability is local‑only and requires the attacker to run code with elevated rights on the target machine. Once the double‑fetch condition is triggered, the attacker can achieve full kernel‑level execution or force a system crash. No public exploit code exists at this time, and the EPSS value is unavailable, but the potential impact is high. The issue is not listed in CISA’s KEV catalog, and it is not known to be actively exploited in the wild. Nevertheless, the feasibility of arbitrary code execution in kernel mode makes it a critical security concern for any user running a pre‑22.1 Avast or AVG installation.

Generated by OpenCVE AI on May 8, 2026 at 06:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Avast or AVG version 22.1 or later, which includes a fixed socket handler that removes the double‑fetch condition.
  • If an upgrade is not immediately possible, uninstall the anti‑rootkit driver component to remove the vulnerable module.
  • Reboot the system to ensure the driver is not loaded into kernel space and verify that aswArPot.sys is absent from active services.

Generated by OpenCVE AI on May 8, 2026 at 06:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 07:15:00 +0000

Type Values Removed Values Added
Title Kernel-Mode Arbitrary Code Execution via Double Fetch in Avast and AVG Anti Rootkit Driver
Weaknesses CWE-269
CWE-362

Fri, 08 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T04:25:27.339Z

Reserved: 2022-03-07T00:00:00.000Z

Link: CVE-2022-26523

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T05:16:09.033

Modified: 2026-05-08T05:16:09.033

Link: CVE-2022-26523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T07:00:04Z

Weaknesses