IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
References
Link | Resource |
---|---|
http://advanced.com | Not Applicable |
http://iobit.com | Vendor Advisory |
https://github.com/tomerpeled92/CVE/ | Third Party Advisory |
http://advanced.com | Not Applicable |
http://iobit.com | Vendor Advisory |
https://github.com/tomerpeled92/CVE/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://advanced.com - Not Applicable | |
References | () http://iobit.com - Vendor Advisory | |
References | () https://github.com/tomerpeled92/CVE/ - Third Party Advisory |
Information
Published : 2022-07-06 13:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24138
Mitre link : CVE-2022-24138
CVE.ORG link : CVE-2022-24138
JSON object : View
Products Affected
iobit
- advanced_systemcare
CWE
CWE-552
Files or Directories Accessible to External Parties