CVE-2024-13990

CRITICAL EXPLOITED

MicroWorld eScan AV - SSRF

Title source: llm
STIX 2.1

Description

MicroWorld eScan AV's update mechanism failed to ensure authenticity and integrity of updates: update packages were delivered and accepted without robust cryptographic verification. As a result, an on-path attacker could perform a man-in-the-middle (MitM) attack and substitute malicious update payloads for legitimate ones. The eScan AV client accepted these substituted packages and executed or loaded their components (including sideloaded DLLs and Java/installer payloads), enabling remote code execution on affected systems. MicroWorld eScan confirmed remediation of the update mechanism on 2023-07-31 but versioning details are unavailable. NOTE: MicroWorld eScan disputes the characterization in third-party reports, stating the issue relates to 2018–2019 and that controls were implemented then.

Scores

CVSS v4 9.3
EPSS 0.0020
EPSS Percentile 42.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

VulnCheck KEV 2024-04-23
CWE
CWE-295 CWE-347
Status published
Products (1)
MicroWorld Technologies/eScan AV
Published Sep 19, 2025
Tracked Since Feb 18, 2026