First published: Wed Jul 07 2021(Updated: )
A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0e0, the first dword passed in the input buffer is the device port to write to and the dword at offset 4 is the value to write via the OUT instruction. A local attacker can send a malicious IRP to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
IOBit Advanced SystemCare Ultimate | =14.2.0.220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21789 is a privilege escalation vulnerability in IOBit Advanced SystemCare Ultimate 14.2.0.220.
The severity of CVE-2021-21789 is high, with a score of 8.8.
CVE-2021-21789 allows malicious actors to escalate privileges by exploiting the way the IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests.
To fix CVE-2021-21789, update IOBit Advanced SystemCare Ultimate to version 14.2.0.220 or install the latest available patch.
You can find more information about CVE-2021-21789 at this link: [https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254](https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254)