
CVE-2023-1641 – IObit Malware Fighter IOCTL ObCallbackProcess.sys 0x222018 denial of service
https://notcve.org/view.php?id=CVE-2023-1641
26 Mar 2023 — A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. • https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view • CWE-404: Improper Resource Shutdown or Release •

CVE-2023-1640 – IObit Malware Fighter IOCTL ObCallbackProcess.sys 0x222010 denial of service
https://notcve.org/view.php?id=CVE-2023-1640
26 Mar 2023 — A vulnerability classified as problematic was found in IObit Malware Fighter 9.4.0.776. This vulnerability affects the function 0x222010 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. • https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view • CWE-404: Improper Resource Shutdown or Release •

CVE-2023-1639 – IObit Malware Fighter IOCTL ImfRegistryFilter.sys 0x8001E04C denial of service
https://notcve.org/view.php?id=CVE-2023-1639
26 Mar 2023 — A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. • https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view • CWE-404: Improper Resource Shutdown or Release •

CVE-2023-1638 – IObit Malware Fighter IOCTL ImfRegistryFilter.sys 0x8001E040 denial of service
https://notcve.org/view.php?id=CVE-2023-1638
26 Mar 2023 — A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been rated as problematic. Affected by this issue is the function 0x8001E024/0x8001E040 in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. • https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view • CWE-404: Improper Resource Shutdown or Release •

CVE-2022-37197 – IOTransfer V4 - Unquoted Service Path
https://notcve.org/view.php?id=CVE-2022-37197
18 Nov 2022 — IOBit IOTransfer V4 is vulnerable to Unquoted Service Path. IOBit IOTransfer V4 es vulnerable a la ruta de servicio sin comillas. • https://www.exploit-db.com/exploits/51029 • CWE-428: Unquoted Search Path or Element •

CVE-2022-37771
https://notcve.org/view.php?id=CVE-2022-37771
06 Sep 2022 — IObit Malware Fighter v9.2 for Microsoft Windows lacks tamper protection, allowing authenticated attackers with Administrator privileges to modify processes within the application and escalate privileges to SYSTEM via a crafted executable. IObit Malware Fighter versión v9.2 para Microsoft Windows carece de protección contra manipulaciones, permitiendo a atacantes autenticados con privilegios de administrador modificar los procesos dentro de la aplicación y escalar los privilegios a SYSTEM por medio de un ej... • https://mrvar0x.com/2022/08/02/multiple-endpoints-security-tampering-exploit • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2022-24141
https://notcve.org/view.php?id=CVE-2022-24141
06 Jul 2022 — The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient(). El componente iTopVPNmini.exe de iTop VPN versión 3.2, intentará conectarse a datastate_iTopVPN_Pipe_Server en un bucle. Un atacante que abriera una tubería con nombre con el mismo nombre puede usarla para obtener el token de otro... • http://iobit.com •

CVE-2022-24140
https://notcve.org/view.php?id=CVE-2022-24140
06 Jul 2022 — IOBit Advanced System Care 15, iTop Screen Recorder 2.1, iTop VPN 3.2, Driver Booster 9, and iTop Screenshot sends HTTP requests in their update procedure in order to download a config file. After downloading the config file, the products will parse the HTTP location of the update from the file and will try to install the update automatically with ADMIN privileges. An attacker Intercepting this communication can supply the product a fake config file with malicious locations for the updates thus gaining a re... • http://advanced.com • CWE-494: Download of Code Without Integrity Check •

CVE-2022-24139
https://notcve.org/view.php?id=CVE-2022-24139
06 Jul 2022 — In IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -> SYSTEM or from Local ADMIN-> Domain ADMIN depending on the use... • http://advanced.com • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2022-24138
https://notcve.org/view.php?id=CVE-2022-24138
06 Jul 2022 — IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN). IOBit Advanced System Care (Asc.exe) versión 15 y Action Download Center descargan componentes d... • http://advanced.com • CWE-552: Files or Directories Accessible to External Parties •