Cyber-attack: Enable automatic updates on anti-virus products to prevent vulnerabilities, says NCC - TheCable

Cyber-attack: Enable automatic updates on anti-virus products to prevent vulnerabilities, says NCC - TheCable

The Nigerian Communications Commission (NCC) says enabling automatic update features for AVAST and AVG anti-virus applications could prevent cyber vulnerabilities.The commission’s computer security incident response team (CSIRT) said this on Sunday in a statement signed by Ikechukwu Adinde, NCC’s director of public affairs.


NCC said the vulnerabilities in AVAST and AVG anti-virus apps can lead to millions of devices being attacked.


The commission, however, advised consumers to always enable automatic update features to stay safe.


NCC has been vocal about the increasing rate of cyber-attacks in recent times.



Advertisement


It said the latest advisory is part of efforts to keep Nigerians safe on the internet.


“The AVAST and AVG Antiviruses can lead to attacks on millions of devices with high impact in terms of consequences to the ICT user,” the statement reads.


“The threat types as a result of this vulnerability are bypass authentication, remote code execution and unauthorised access while consequences range from privilege escalation, bypass security products, overwrite system components and corrupting the operating system.



Advertisement


“According to CSIRT, researchers at SentinelOne security firm have discovered two potentially damaging vulnerabilities in AVAST and AVG antivirus products that allow attackers to escalate privileges enabling them to disable security products, overwrite system components, corrupt the operating system, or perform malicious operations unimpeded.


“Two vulnerabilities identified as CVE-2022-26522 and CVE-2022-26523 targeted the “anti rootkit” driver of Avast antivirus (also used by AVG) allowing an attacker with limited privileges on the targeted system to execute code in system mode (kernel mode) and take complete control of the device. Moreover, the vulnerabilities allow complete take-over of a device, even wit ..

Support the originator by clicking the read the rest link below.