IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
References
Link | Resource |
---|---|
http://advanced.com | Not Applicable |
http://iobit.com | Vendor Advisory |
https://github.com/tomerpeled92/CVE/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Jul 2022, 01:09
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-552 | |
References | (MISC) http://iobit.com - Vendor Advisory | |
References | (MISC) http://advanced.com - Not Applicable | |
References | (MISC) https://github.com/tomerpeled92/CVE/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CPE | cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:pro:*:*:* cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:free:*:*:* |
06 Jul 2022, 13:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-06 13:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-24138
Mitre link : CVE-2022-24138
CVE.ORG link : CVE-2022-24138
JSON object : View
Products Affected
iobit
- advanced_systemcare
CWE
CWE-552
Files or Directories Accessible to External Parties