CVE-2021-21788

A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0dc, the first dword passed in the input buffer is the device port to write to and the word at offset 4 is the value to write via the OUT instruction. The OUT instruction can write one byte to the given I/O device port, potentially leading to escalated privileges of unprivileged users. A local attacker can send a malicious IRP to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iobit:advanced_systemcare_ultimate:14.2.0.220:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 - Exploit, Third Party Advisory

Information

Published : 2021-07-07 17:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21788

Mitre link : CVE-2021-21788

CVE.ORG link : CVE-2021-21788


JSON object : View

Products Affected

iobit

  • advanced_systemcare_ultimate
CWE
CWE-782

Exposed IOCTL with Insufficient Access Control

NVD-CWE-Other