Arbitrary Process Termination via Vulnerable Driver in Baidu Antivirus
CVE-2024-51324

3.8LOW

Key Information:

Vendor

Baidu

Vendor
CVE Published:
11 February 2025

What is CVE-2024-51324?

CVE-2024-51324 is a notable vulnerability found in Baidu Antivirus, specifically within the BdApiUtil driver version 5.2.3.116083. This vulnerability allows attackers to perform arbitrary process termination by executing a Bring Your Own Vulnerable Driver (BYOVD) attack. Baidu Antivirus is designed to provide robust security features to protect end-users from malware and various cyber threats. However, the presence of this vulnerability can severely compromise an organization's security posture, as it permits unauthorized termination of processes, which may lead to service disruption or unauthorized access to sensitive data.

The technical specifics reveal that the flaw is rooted in the driver’s handling of certain operations, which can be exploited to gain control over the process management functions of the operating system. This kind of manipulation could enable cybercriminals to target critical applications, potentially shutting them down or rendering them unresponsive, thereby causing operational setbacks.

Potential impact of CVE-2024-51324

  1. Arbitrary Process Termination: The most direct impact of this vulnerability is that attackers can arbitrarily terminate processes on an affected system. This could lead to disruption of essential services and applications that rely on those processes, causing downtime or service inadequacies.

  2. Increased Risk of Further Exploitation: Once an attacker has the capability to terminate processes, they may exploit this ability to disable security features or monitoring tools, allowing them to execute further attacks or conduct reconnaissance undetected. This increases the risk of data breaches and system compromises.

  3. Operational Disruption and Financial Losses: Organizations relying on Baidu Antivirus for their cybersecurity defenses may experience significant operational disruption due to the exploitation of this vulnerability. Such disruptions can lead to potential financial losses and damage to the organization’s reputation, especially if sensitive information is compromised or if business continuity is affected.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
3.8
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.