CVE-2022-24562

In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iobit:iotransfer:4.3.1.1561:*:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () http://iobit.com - Product, Vendor Advisory () http://iobit.com - Product, Vendor Advisory
References () http://iotransfer.com - Broken Link () http://iotransfer.com - Broken Link
References () http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d - () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 CWE-306

27 Oct 2022, 16:05

Type Values Removed Values Added
References (MISC) http://iobit.com - Product (MISC) http://iobit.com - Product, Vendor Advisory
References (MISC) http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) http://iotransfer.com - Product (MISC) http://iotransfer.com - Broken Link

21 Jul 2022, 22:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html -

27 Jun 2022, 18:31

Type Values Removed Values Added
CPE cpe:2.3:a:iobit:iotransfer:4.3.1.1561:*:*:*:*:*:*:*
References (MISC) https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d - (MISC) https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d - Exploit, Third Party Advisory
References (MISC) http://iobit.com - (MISC) http://iobit.com - Product
References (MISC) http://iotransfer.com - (MISC) http://iotransfer.com - Product
CWE CWE-287
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8

16 Jun 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-16 19:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24562

Mitre link : CVE-2022-24562

CVE.ORG link : CVE-2022-24562


JSON object : View

Products Affected

iobit

  • iotransfer
CWE
CWE-306

Missing Authentication for Critical Function