CVE-2024-13614 (GCVE-0-2024-13614)

Vulnerability from cvelistv5 – Published: 2025-02-06 16:13 – Updated: 2025-02-12 19:51
VLAI?
Summary
Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.
CWE
  • CWE-190 - Integer Overflow or Wraparound
Assigner
References
Credits
Florian Schweins
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13614",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-06T16:34:12.660585Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-12T19:51:09.532Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Kaspersky Anti-Virus SDK for Windows",
          "vendor": "Kaspersky",
          "versions": [
            {
              "lessThanOrEqual": "8.10.1.1943",
              "status": "affected",
              "version": "8.10.1.1943",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.10.1.1943 CF",
              "status": "affected",
              "version": "8.10.1.1943 CF",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Kaspersky Security for Virtualization Light Agent",
          "vendor": "Kaspersky",
          "versions": [
            {
              "lessThan": "5.2.27.319",
              "status": "affected",
              "version": "5.2",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.2.27.319",
              "status": "unknown",
              "version": "5.2.27.319",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Endpoint Security for Windows",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Small Office Security",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky for Windows (Standard, Plus, Premium)",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Free",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Anti-Virus",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Internet Security",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Security Cloud",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Safe Kids",
          "vendor": "Kaspersky"
        },
        {
          "defaultStatus": "unknown",
          "product": "Kaspersky Anti-Ransomware Tool",
          "vendor": "Kaspersky"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Florian Schweins"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "There have been no recorded attempts to exploit this issue in the wild."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190: Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-02-06T16:16:54.229Z",
        "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988",
        "shortName": "Kaspersky"
      },
      "references": [
        {
          "name": "Advisory issued on February 6, 2025",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To fix the vulnerability, upgrade the KAV SDK for Windows to the following version: Kaspersky Anti-Virus Software Development Kit 8 Level 3 v. 8.10.2.2098. Contact your Technical Account Manager to obtain the necessary instructions."
        },
        {
          "lang": "en",
          "value": "Install Kaspersky Security for Virtualization Light Agent 5.2.27.319 (with Kaspersky Security Components Installation Wizard 5.2.1.4005) or newer using the following url: https://www.kaspersky.com/small-to-medium-business-security/downloads/virtualization-hybrid-cloud"
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Endpoint Security for Windows. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Small Office Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky for Windows (Standard, Plus, Premium). To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Free. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Anti-Virus. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Internet Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Security Cloud. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Safe Kids. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        },
        {
          "lang": "en",
          "value": "The fix was installed automatically for Kaspersky Anti-Ransomware Tool. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer."
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-02-06T00:00:00.000Z",
          "value": "Advisory published by Kaspersky"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988",
    "assignerShortName": "Kaspersky",
    "cveId": "CVE-2024-13614",
    "datePublished": "2025-02-06T16:13:08.173Z",
    "dateReserved": "2025-01-22T06:31:25.425Z",
    "dateUpdated": "2025-02-12T19:51:09.532Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-13614\",\"sourceIdentifier\":\"vulnerability@kaspersky.com\",\"published\":\"2025-02-06T17:15:18.080\",\"lastModified\":\"2025-02-06T17:15:18.080\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.\"},{\"lang\":\"es\",\"value\":\"Kaspersky ha corregido un problema de seguridad en Kaspersky Anti-Virus SDK para Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security para Windows, Kaspersky Small Office Security, Kaspersky para Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids y Kaspersky Anti-Ransomware Tool que pod\u00eda permitir que un atacante autenticado escribiera datos en un \u00e1rea limitada fuera del b\u00fafer de memoria del n\u00facleo asignado. La correcci\u00f3n se instal\u00f3 autom\u00e1ticamente para todos los productos Kaspersky Endpoint.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vulnerability@kaspersky.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"vulnerability@kaspersky.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"references\":[{\"url\":\"https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225\",\"source\":\"vulnerability@kaspersky.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"e45d732a-8f6b-4b6b-be76-7420f6a2b988\", \"shortName\": \"Kaspersky\", \"dateUpdated\": \"2025-02-06T16:16:54.229Z\"}, \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190: Integer Overflow or Wraparound\", \"type\": \"CWE\"}]}], \"affected\": [{\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Virus SDK for Windows\", \"versions\": [{\"version\": \"8.10.1.1943\", \"status\": \"affected\", \"lessThanOrEqual\": \"8.10.1.1943\", \"versionType\": \"custom\"}, {\"version\": \"8.10.1.1943 CF\", \"status\": \"affected\", \"lessThanOrEqual\": \"8.10.1.1943 CF\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Security for Virtualization Light Agent\", \"versions\": [{\"version\": \"5.2\", \"status\": \"affected\", \"lessThan\": \"5.2.27.319\", \"versionType\": \"custom\"}, {\"version\": \"5.2.27.319\", \"status\": \"unknown\", \"lessThanOrEqual\": \"5.2.27.319\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Endpoint Security for Windows\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Small Office Security\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky for Windows (Standard, Plus, Premium)\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Free\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Virus\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Internet Security\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Security Cloud\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Safe Kids\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Ransomware Tool\", \"defaultStatus\": \"unknown\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.\"}], \"metrics\": [{\"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}], \"cvssV3_1\": {\"version\": \"3.1\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H\"}}], \"solutions\": [{\"lang\": \"en\", \"value\": \"To fix the vulnerability, upgrade the KAV SDK for Windows to the following version: Kaspersky Anti-Virus Software Development Kit 8 Level 3 v. 8.10.2.2098. Contact your Technical Account Manager to obtain the necessary instructions.\"}, {\"lang\": \"en\", \"value\": \"Install Kaspersky Security for Virtualization Light Agent 5.2.27.319 (with Kaspersky Security Components Installation Wizard 5.2.1.4005) or newer using the following url: https://www.kaspersky.com/small-to-medium-business-security/downloads/virtualization-hybrid-cloud\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Endpoint Security for Windows. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Small Office Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky for Windows (Standard, Plus, Premium). To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Free. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Anti-Virus. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Internet Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Security Cloud. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Safe Kids. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Anti-Ransomware Tool. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"There have been no recorded attempts to exploit this issue in the wild.\"}], \"timeline\": [{\"time\": \"2025-02-06T00:00:00.000Z\", \"lang\": \"en\", \"value\": \"Advisory published by Kaspersky\"}], \"credits\": [{\"lang\": \"en\", \"value\": \"Florian Schweins\", \"type\": \"finder\"}], \"references\": [{\"url\": \"https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225\", \"name\": \"Advisory issued on February 6, 2025\", \"tags\": [\"vendor-advisory\"]}]}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-13614\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-06T16:34:12.660585Z\"}}}], \"providerMetadata\": {\"shortName\": \"CISA-ADP\", \"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"dateUpdated\": \"2025-02-12T19:41:24.794Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-13614\", \"assignerOrgId\": \"e45d732a-8f6b-4b6b-be76-7420f6a2b988\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Kaspersky\", \"dateReserved\": \"2025-01-22T06:31:25.425Z\", \"datePublished\": \"2025-02-06T16:13:08.173Z\", \"dateUpdated\": \"2025-02-06T16:16:54.229Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…