CVE-2022-24562

In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iobit:iotransfer:4.3.1.1561:*:*:*:*:*:*:*

History

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d', 'name': 'https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 CWE-306

Information

Published : 2022-06-16 19:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-24562

Mitre link : CVE-2022-24562

CVE.ORG link : CVE-2022-24562


JSON object : View

Products Affected

iobit

  • iotransfer
CWE
CWE-306

Missing Authentication for Critical Function