First published: Wed Jul 06 2022(Updated: )
IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Iobit Advanced Systemcare | =15 | |
Iobit Advanced Systemcare | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24138 is a vulnerability in IOBit Advanced System Care (Asc.exe) 15 and Action Download Center that allows low privilege users to switch a genuine component with a malicious one.
CVE-2022-24138 has a severity rating of 7.8, which is considered high.
CVE-2022-24138 allows low privilege users to download malicious components into the ProgramData folder of IOBit Advanced System Care.
To fix CVE-2022-24138, it is recommended to update IOBit Advanced System Care to a version that addresses the vulnerability.
You can find more information about CVE-2022-24138 on the official websites of IOBit and Advanced System Care, as well as the GitHub repository provided in the references.