First published: Thu Jun 16 2022(Updated: )
In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IOBit IOTransfer | =4.3.1.1561 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24562 is critical with a CVSS score of 9.8.
IOBit IOTransfer version 4.3.1.1561 is affected by CVE-2022-24562.
An unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file system with admin privileges on the victim's endpoint, which can result in data theft and remote code execution.
Yes, you can find more information about CVE-2022-24562 at the following references: http://iobit.com, http://iotransfer.com, and http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html.
The CWE of CVE-2022-24562 is CWE-306.