From Adanna Nnamani, Abuja
The Nigerian Communications Commission (NCC) has advised telecom consumers and other Information and Communications Technology (ICT) end-users on the need to always enable automatic update features for AVAST and AVG antiviruses to prevent potential cyber vulnerabilities.
According to NCC, this was contained in a new advisory released by the Computer Security Incident Response Team (CSIRT), the cybersecurity centre for the telecom sector established by the Commission.
Are you a Man 40 yrs and above? Do not miss the Vital Information, it goes off in 2 days! CLICH HERE to READ .
In a statement by NCC’s Spokesperson, Dr Ikechukwu Adinde on Monday, the advisory noted that cyber vulnerability in AVAST and AVG Antiviruses can lead to attacks on millions of devices with high impact in terms of consequences to the ICT user.
100% Natural Herbs to Finally End Premature Ejaculation, Weak Erection and Small Manhood. >>>Click Here for Details<<< .
The threat types as a result of this vulnerability are Bypass Authentication, Remote Code Execution and Unauthorised Access while consequences range from Privilege Escalation, Bypass Security Products, Overwrite System Components and corrupting the Operating System.
“According to CSIRT, researchers at SentinelOne security firm have discovered two potentially damaging vulnerabilities in AVAST and AVG antivirus products that allow attackers to escalate privileges enabling them to disable security products, overwrite system components, corrupt the operating system, or perform malicious operations unimpeded.
Breaking!!! Earn up to N2 – N3 million monthly GUARANTEED (all paid in US Dollars). No training or refereal required. Do business with top USA companies like Amazon, Tesla, Facebook, IBM, Netflix, Zoom, etc. Learn more .
“Two vulnerabilities identified as CVE-2022-26522 and CVE-2022-26523 targeted the “Anti Rootkit” driver of Avast antivirus (also used by AVG) allowing an attacker with limited privileges on the targeted system to execute code in system mode (kernel mode) and take complete control of the device. Moreover, the vulnerabilities allow complete take-over of a device, even without privileges, due to the ability to execute code in kernel mode,” the CSIRT said in the advisory.” The statement said.