First published: Fri Feb 18 2022(Updated: )
A Use after Free vulnerability exists in IOBit Advanced SystemCare 15 pro via requests sent in sequential order using the IOCTL driver codes, which could let a malicious user execute arbitrary code or a Denial of Service (system crash). IOCTL list: iobit_ioctl = [0x8001e01c, 0x8001e020, 0x8001e024, 0x8001e040,0x8001e044, 0x8001e048, 0x8001e04c, 0x8001e000, 0x8001e004, 0x8001e008, 0x8001e00c, 0x8001e010, 0x8001e014, 0x8001e018]
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IObit Advanced SystemCare | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44968 is a Use after Free vulnerability in IOBit Advanced SystemCare 15 pro that could allow a malicious user to execute arbitrary code or cause a Denial of Service.
The Use after Free vulnerability occurs via requests sent in sequential order using the IOCTL driver codes.
CVE-2021-44968 has a severity rating of 7.8 (high).
A malicious user can exploit this vulnerability by sending specially crafted requests using the IOCTL driver codes.
At the time of writing this FAQ, there is no official fix available for CVE-2021-44968. It is recommended to update to the latest version of IOBit Advanced SystemCare and follow vendor advisories for any patches or mitigations.