Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avast
Avast antivurus Avast avg Antivirus |
|
| Vendors & Products |
Avast
Avast antivurus Avast avg Antivirus |
Fri, 08 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Kernel‑Mode Code Execution via Double‑Fetch in Avast/AVG Anti‑Rootkit Driver |
Fri, 08 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Kernel‑Mode Code Execution via Double‑Fetch in Avast/AVG Anti‑Rootkit Driver | |
| Weaknesses | CWE-416 CWE-84 |
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Kernel‑Mode Code Execution via Double‑Fetch in Avast/AVG Anti‑Rootkit Driver | |
| Weaknesses | CWE-416 CWE-84 |
Fri, 08 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xc4a3. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T14:29:11.603Z
Reserved: 2022-03-07T00:00:00.000Z
Link: CVE-2022-26522
Updated: 2026-05-08T14:28:37.497Z
Status : Awaiting Analysis
Published: 2026-05-08T05:16:08.893
Modified: 2026-05-08T16:02:14.343
Link: CVE-2022-26522
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:25:28Z