First published: Wed Jun 13 2018(Updated: )
An issue was discovered in VirusTotal. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Virustotal Virustotal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10408 is classified as a moderate severity vulnerability due to its potential to allow execution of malicious code.
CVE-2018-10408 exploits third-party code signing checks by allowing an unsigned Universal/fat binary to be misidentified as a legitimate Apple-signed binary.
CVE-2018-10408 specifically affects the VirusTotal tool that analyzes code for potential threats.
Users can mitigate risks related to CVE-2018-10408 by ensuring that they only use trusted sources for binaries and keeping their VirusTotal software updated.
If a malicious binary is detected due to CVE-2018-10408, users should immediately remove the binary and scan their systems for further compromises.