IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
References
Link | Resource |
---|---|
http://iobit.com | Vendor Advisory |
http://advanced.com | Not Applicable |
https://github.com/tomerpeled92/CVE/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-07-06 06:15
Updated : 2022-07-13 18:09
NVD link : CVE-2022-24138
Mitre link : CVE-2022-24138
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
iobit
- advanced_systemcare