Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Avast
Avast avast Avg Avg antivirus |
|
| Vendors & Products |
Avast
Avast avast Avg Avg antivirus |
Fri, 08 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kernel Code Execution via Double Fetch in Avast/AVG Anti Rootkit |
Fri, 08 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kernel-Mode Arbitrary Code Execution via Double Fetch in Avast and AVG Anti Rootkit Driver | |
| Weaknesses | CWE-269 CWE-362 |
Fri, 08 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Kernel-Mode Arbitrary Code Execution via Double Fetch in Avast and AVG Anti Rootkit Driver | |
| Weaknesses | CWE-269 CWE-362 |
Fri, 08 May 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xbb94. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T14:07:59.984Z
Reserved: 2022-03-07T00:00:00.000Z
Link: CVE-2022-26523
Updated: 2026-05-08T14:07:55.740Z
Status : Awaiting Analysis
Published: 2026-05-08T05:16:09.033
Modified: 2026-05-08T16:02:14.343
Link: CVE-2022-26523
No data.
OpenCVE Enrichment
Updated: 2026-05-11T16:11:39Z