CVE-2022-40425
Python vulnerability analysis and mitigation

Overview

A vulnerability was discovered in Webroot Secure Anywhere version 21.4 affecting the IOCTL GetProcessCommand and B03 functionality. The vulnerability was assigned CVE-2022-40425 and was disclosed on March 15, 2022. The issue affects the WRCore.x64.sys driver component of Webroot Secure Anywhere software ([Talos Report](https://www.talosintelligence.com/vulnerabilityreports/TALOS-2021-1433)).

Technical details

The vulnerability is an out-of-bounds read issue in the IOCTL GetProcessCommand and B03 functionality of the WRCorex64 device driver. The vulnerability occurs when processing specific IOCTL requests with invalid data, which can lead to reading memory outside of allocated bounds. The CVSS score for this vulnerability is 7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H), indicating a high severity local attack vector (Talos Report).

Impact

If successfully exploited, this vulnerability can lead to denial of service conditions on affected systems. The out-of-bounds read can cause system crashes, resulting in a blue screen of death when the invalid memory access is attempted (Talos Report).

Mitigation and workarounds

The vulnerability was addressed in an updated version of Webroot Secure Anywhere. Users should update to the latest version of the software to protect against this vulnerability (Talos Report).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management