Aida64 Engineer Buffer Overflow (CVE-2019-25360)
CVE-2019-25360
Aida64 Engineer 6.10.5200 contains a buffer overflow vulnerability in the CSV logging configuration that allows attackers to execute malicious code by crafting a specially designed payload. Attackers ...
Overview
A critical security flaw has been identified in AIDA64 Engineer version 6.10.5200, a popular system diagnostics and benchmarking tool. This vulnerability allows an attacker to take complete control of an affected system by exploiting a weakness in the software’s logging feature.
Vulnerability Explained
In simple terms, the vulnerability exists in the feature that saves system reports as CSV (Comma-Separated Values) files. The software does not properly check the size of data being written into a fixed-size memory buffer during this logging process. By creating a specially crafted, malicious CSV file, an attacker can overflow this buffer. This overflow corrupts the program’s memory and can be used to overwrite the system’s built-in error-handling mechanisms. Once these are overwritten, the attacker can redirect the program to execute their own malicious code.
Potential Impact
The impact of this vulnerability is severe. If successfully exploited, an attacker can achieve Remote Code Execution (RCE). This means they can run any code they choose on the victim’s computer with the same privileges as the user running AIDA64. Consequences include:
- Full system compromise and data theft.
- Installation of malware, ransomware, or backdoors.
- Use of the compromised machine as a foothold to attack other systems on the network. Given the software’s common use for hardware diagnostics, it may be run with administrative privileges, which would grant the attacker the highest level of system access.
Remediation and Mitigation
Immediate Action Required: Due to the critical nature (CVSS: 9.8) and ease of exploitation, prompt action is necessary.
-
Update the Software: This is the primary and most effective solution. Upgrade AIDA64 Engineer to the latest version available from the official vendor (FinalWire). The vendor has released a patched version that addresses this buffer overflow. Verify you are running a version newer than 6.10.5200.
-
Restrict File Sources: Do not open CSV or other data files from untrusted or unknown sources with AIDA64. The exploit requires the victim to open a maliciously crafted file.
-
Principle of Least Privilege: Avoid running AIDA64 with administrative rights unless absolutely necessary for its core function. This can limit the potential damage of a successful exploit.
-
Network Segmentation: On corporate networks, consider restricting the use of diagnostic software like AIDA64 to segmented networks, especially if it is not a business-critical application for all users.
IT administrators should prioritize updating this software on any workstation where it is installed, particularly those used by technical staff or engineers who are more likely to use such diagnostic tools.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Mod...
HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service...
Ayukov NFTP client 1.71 contains a buffer overflow vulnerability in the SYST command handling that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted SYST comman...
MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remote attackers to execute arbitrary code. Attackers can send a crafted oversized buffer to the POP3 ser...