On March 4th, Avast antivirus was alerted to a vulnerability in its JavaScript emulation engine by researcher Tavis Ormandy. Just a few days later, Ormandy released a tool on GitHub that made analyzing the engine easier. Avast’s JavaScript engine ran with SYSTEM level privileges while processing untrusted JavaScript by design which makes it an attractive target for attackers to attempt remote code execution exploits. On March 11th, the antivirus company announced on Twitter that it had decided to disable the emulator for all users globally.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security