First published: Wed Jul 07 2021(Updated: )
A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0dc, the first dword passed in the input buffer is the device port to write to and the word at offset 4 is the value to write via the OUT instruction. The OUT instruction can write one byte to the given I/O device port, potentially leading to escalated privileges of unprivileged users. A local attacker can send a malicious IRP to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
IOBit Advanced SystemCare Ultimate | =14.2.0.220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-21788 is high with a CVSS score of 8.8.
The affected software for CVE-2021-21788 is IOBit Advanced SystemCare Ultimate version 14.2.0.220.
The CWE for CVE-2021-21788 is CWE-782.
CVE-2021-21788 exploits a privilege escalation vulnerability in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests.
There is no known fix available for CVE-2021-21788 at the moment. It is recommended to update to the latest version of the software and follow the vendor's security advisories for any patches or mitigations.