Researchers discovered
the vulnerability in March when an enSilo product collided with an AVG Internet Security 2015 installation present on a customer's systems. A closer analysis revealed that the AVG product had been plagued by a flaw that could have been exploited to hack affected systems. enSilo later discovered that the same vulnerability, which it rated 'critical,' also affected Kaspersky's Anti-Virus 2015 MR2 and Internet Security 2015 MR2 products, and Intel Security's McAfee VirusScan Enterprise version 8.8. According to enSilo, the problem is related to how affected security products allocate a memory page with RWX (Read, Write, Execute) permissions at a constant predictable address. Experts say the vulnerability makes it easier for malicious actors to bypass Windows protections and exploit vulnerabilities in third-party applications, such as web browsers and Adobe Reader, to compromise the underlying system in a multi-stage attack. The company has developed a
tool that allows users to determine if a vulnerable application is present on their system. The tool doesn't pinpoint the vulnerable application, but it provides information on where to start the analysis.