The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. \DosDevices\AscRegistryFilter and \Device\AscRegistryFilter are affected.
References
Link | Resource |
---|---|
https://github.com/FULLSHADE/Kernel-exploits | Third Party Advisory |
https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys | Exploit Third Party Advisory |
https://www.iobit.com/en/advancedsystemcarefree.php | Product Vendor Advisory |
https://github.com/FULLSHADE/Kernel-exploits | Third Party Advisory |
https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys | Exploit Third Party Advisory |
https://www.iobit.com/en/advancedsystemcarefree.php | Product Vendor Advisory |
Configurations
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/FULLSHADE/Kernel-exploits - Third Party Advisory | |
References | () https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys - Exploit, Third Party Advisory | |
References | () https://www.iobit.com/en/advancedsystemcarefree.php - Product, Vendor Advisory |
Information
Published : 2021-02-05 19:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10234
Mitre link : CVE-2020-10234
CVE.ORG link : CVE-2020-10234
JSON object : View
Products Affected
iobit
- advanced_systemcare
CWE