Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Avast AntiTrack Flaw Allows MitM Attacks on HTTPS Traffic

A vulnerability in Avast’s anti-tracking solution could allow malicious actors to perform man-in-the-middle (MitM) attacks on HTTPS traffic, a security researcher has discovered.

The security flaw, which impacts both Avast and AVG AntiTrack, as they share underlying code, resides in the manner in which the software filters HTTPS traffic.

A vulnerability in Avast’s anti-tracking solution could allow malicious actors to perform man-in-the-middle (MitM) attacks on HTTPS traffic, a security researcher has discovered.

The security flaw, which impacts both Avast and AVG AntiTrack, as they share underlying code, resides in the manner in which the software filters HTTPS traffic.

Moreover, with the feature enabled, a browser could successfully connect using TLS 1.0, even if the old security protocol had been explicitly disabled in the browser.

The bug could be triggered without performing any special action, using AntiTrack in its default configuration, web designer and security consultant David Eade reveals.

Eade discovered that AntiTrack proxies traffic to HTTPS sites using its own certificates, after adding its own certificate (named “AvastAntiTrack 2”) to the Windows “Trusted Root Certification Authorities” store at installation.

The solution presents the browser with a certificate of its own for each website visited, and the user is shown a secure padlock icon when navigating to the site, although traffic is not protected to the end web server, the researcher says.

According to Eade, Avast AntiTrack fails to check the validity of web server certificates, which makes it easy for an MitM attacker to serve a fake site using a self-signed certificate. While the attack should not work under normal circumstances, AntiTrack’s proxy ignores the certificate problem and presents to the victim its own certificate, which is trusted by the victim’s browser.

The anti-tracking solution also downgrades the browser’s security protocol to TLS 1.0, even if the application was configured to use only TLS 1.2 or higher — as is the case with Internet Explorer and Microsoft Edge.

On top of that, the researcher discovered that AntiTrack does not honor browser cipher suites and ignores them in favor of older, weaker ciphers. Furthermore, the solution does not support Forward Secrecy.

Tracked as CVE-2020-8987, the issues were reported to Avast in August last year and were fixed with the release of Avast AntiTrack version 1.5.1.172 and AVG AntiTrack version 2.0.0.178 in late February and early March 2020, respectively.

Related: Vulnerabilities Disclosed in Kaspersky, Trend Micro Products

Related: Avast, Avira Products Vulnerable to DLL Hijacking

Related: Avast Discloses New Supply-Chain Attack Attempt

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.