The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 08 May 2026 07:15:00 +0000

Type Values Removed Values Added
Title Kernel-Mode Arbitrary Code Execution via Double Fetch in Avast and AVG Anti Rootkit Driver
Weaknesses CWE-269
CWE-362

Fri, 08 May 2026 05:00:00 +0000

Type Values Removed Values Added
Description The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-08T04:25:27.339Z

Reserved: 2022-03-07T00:00:00.000Z

Link: CVE-2022-26523

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T05:16:09.033

Modified: 2026-05-08T05:16:09.033

Link: CVE-2022-26523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T07:00:04Z

Weaknesses