A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0d8, the first dword passed in the input buffer is the device port to write to and the byte at offset 4 is the value to write via the OUT instruction. The OUT instruction can write one byte to the given I/O device port, potentially leading to escalated privileges of unprivileged users.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 - Exploit, Third Party Advisory |
Information
Published : 2021-07-07 17:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21787
Mitre link : CVE-2021-21787
CVE.ORG link : CVE-2021-21787
JSON object : View
Products Affected
iobit
- advanced_systemcare_ultimate
CWE