CVE-2024-13614
Vulnerability from cvelistv5
Published
2025-02-06 16:13
Modified
2025-02-12 19:51
Severity ?
EPSS score ?
Summary
Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Kaspersky | Kaspersky Anti-Virus SDK for Windows |
Version: 8.10.1.1943 < Version: 8.10.1.1943 CF < |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-13614", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-06T16:34:12.660585Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-12T19:51:09.532Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Kaspersky Anti-Virus SDK for Windows", "vendor": "Kaspersky", "versions": [ { "lessThanOrEqual": "8.10.1.1943", "status": "affected", "version": "8.10.1.1943", "versionType": "custom" }, { "lessThanOrEqual": "8.10.1.1943 CF", "status": "affected", "version": "8.10.1.1943 CF", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Kaspersky Security for Virtualization Light Agent", "vendor": "Kaspersky", "versions": [ { "lessThan": "5.2.27.319", "status": "affected", "version": "5.2", "versionType": "custom" }, { "lessThanOrEqual": "5.2.27.319", "status": "unknown", "version": "5.2.27.319", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "Kaspersky Endpoint Security for Windows", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Small Office Security", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky for Windows (Standard, Plus, Premium)", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Free", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Anti-Virus", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Internet Security", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Security Cloud", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Safe Kids", "vendor": "Kaspersky" }, { "defaultStatus": "unknown", "product": "Kaspersky Anti-Ransomware Tool", "vendor": "Kaspersky" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florian Schweins" } ], "descriptions": [ { "lang": "en", "value": "Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products." } ], "exploits": [ { "lang": "en", "value": "There have been no recorded attempts to exploit this issue in the wild." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-06T16:16:54.229Z", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "Advisory issued on February 6, 2025", "tags": [ "vendor-advisory" ], "url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225" } ], "solutions": [ { "lang": "en", "value": "To fix the vulnerability, upgrade the KAV SDK for Windows to the following version: Kaspersky Anti-Virus Software Development Kit 8 Level 3 v. 8.10.2.2098. Contact your Technical Account Manager to obtain the necessary instructions." }, { "lang": "en", "value": "Install Kaspersky Security for Virtualization Light Agent 5.2.27.319 (with Kaspersky Security Components Installation Wizard 5.2.1.4005) or newer using the following url: https://www.kaspersky.com/small-to-medium-business-security/downloads/virtualization-hybrid-cloud" }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Endpoint Security for Windows. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Small Office Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky for Windows (Standard, Plus, Premium). To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Free. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Anti-Virus. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Internet Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Security Cloud. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Safe Kids. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." }, { "lang": "en", "value": "The fix was installed automatically for Kaspersky Anti-Ransomware Tool. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer." } ], "timeline": [ { "lang": "en", "time": "2025-02-06T00:00:00.000Z", "value": "Advisory published by Kaspersky" } ] } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2024-13614", "datePublished": "2025-02-06T16:13:08.173Z", "dateReserved": "2025-01-22T06:31:25.425Z", "dateUpdated": "2025-02-12T19:51:09.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-13614\",\"sourceIdentifier\":\"vulnerability@kaspersky.com\",\"published\":\"2025-02-06T17:15:18.080\",\"lastModified\":\"2025-02-06T17:15:18.080\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"vulnerability@kaspersky.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"vulnerability@kaspersky.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"references\":[{\"url\":\"https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225\",\"source\":\"vulnerability@kaspersky.com\"}]}}", "vulnrichment": { "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"e45d732a-8f6b-4b6b-be76-7420f6a2b988\", \"shortName\": \"Kaspersky\", \"dateUpdated\": \"2025-02-06T16:16:54.229Z\"}, \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"cweId\": \"CWE-190\", \"description\": \"CWE-190: Integer Overflow or Wraparound\", \"type\": \"CWE\"}]}], \"affected\": [{\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Virus SDK for Windows\", \"versions\": [{\"version\": \"8.10.1.1943\", \"status\": \"affected\", \"lessThanOrEqual\": \"8.10.1.1943\", \"versionType\": \"custom\"}, {\"version\": \"8.10.1.1943 CF\", \"status\": \"affected\", \"lessThanOrEqual\": \"8.10.1.1943 CF\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Security for Virtualization Light Agent\", \"versions\": [{\"version\": \"5.2\", \"status\": \"affected\", \"lessThan\": \"5.2.27.319\", \"versionType\": \"custom\"}, {\"version\": \"5.2.27.319\", \"status\": \"unknown\", \"lessThanOrEqual\": \"5.2.27.319\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Endpoint Security for Windows\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Small Office Security\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky for Windows (Standard, Plus, Premium)\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Free\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Virus\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Internet Security\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Security Cloud\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Safe Kids\", \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Kaspersky\", \"product\": \"Kaspersky Anti-Ransomware Tool\", \"defaultStatus\": \"unknown\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products.\"}], \"metrics\": [{\"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}], \"cvssV3_1\": {\"version\": \"3.1\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H\"}}], \"solutions\": [{\"lang\": \"en\", \"value\": \"To fix the vulnerability, upgrade the KAV SDK for Windows to the following version: Kaspersky Anti-Virus Software Development Kit 8 Level 3 v. 8.10.2.2098. Contact your Technical Account Manager to obtain the necessary instructions.\"}, {\"lang\": \"en\", \"value\": \"Install Kaspersky Security for Virtualization Light Agent 5.2.27.319 (with Kaspersky Security Components Installation Wizard 5.2.1.4005) or newer using the following url: https://www.kaspersky.com/small-to-medium-business-security/downloads/virtualization-hybrid-cloud\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Endpoint Security for Windows. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Small Office Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky for Windows (Standard, Plus, Premium). To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Free. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Anti-Virus. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Internet Security. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Security Cloud. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Safe Kids. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}, {\"lang\": \"en\", \"value\": \"The fix was installed automatically for Kaspersky Anti-Ransomware Tool. To check for the fix, check the antivirus database update date, it should be November 6, 2024 or newer.\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"There have been no recorded attempts to exploit this issue in the wild.\"}], \"timeline\": [{\"time\": \"2025-02-06T00:00:00.000Z\", \"lang\": \"en\", \"value\": \"Advisory published by Kaspersky\"}], \"credits\": [{\"lang\": \"en\", \"value\": \"Florian Schweins\", \"type\": \"finder\"}], \"references\": [{\"url\": \"https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225\", \"name\": \"Advisory issued on February 6, 2025\", \"tags\": [\"vendor-advisory\"]}]}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-13614\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-06T16:34:12.660585Z\"}}}], \"providerMetadata\": {\"shortName\": \"CISA-ADP\", \"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"dateUpdated\": \"2025-02-12T19:41:24.794Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}", "cveMetadata": "{\"cveId\": \"CVE-2024-13614\", \"assignerOrgId\": \"e45d732a-8f6b-4b6b-be76-7420f6a2b988\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Kaspersky\", \"dateReserved\": \"2025-01-22T06:31:25.425Z\", \"datePublished\": \"2025-02-06T16:13:08.173Z\", \"dateUpdated\": \"2025-02-06T16:16:54.229Z\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.