CVE-2021-21787
https://notcve.org/view.php?id=CVE-2021-21787
A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0d8, the first dword passed in the input buffer is the device port to write to and the byte at offset 4 is the value to write via the OUT instruction. The OUT instruction can write one byte to the given I/O device port, potentially leading to escalated privileges of unprivileged users. Se presenta una vulnerabilidad de escalada de privilegios en la forma en que el controlador IOBit Advanced SystemCare Ultimate versión 14.2.0.220, maneja las peticiones de escritura de I/O con Privilegios. Durante IOCTL 0x9c40a0d8, el primer dword pasado en el buffer de entrada es el puerto del dispositivo para escribir y el byte en el offset 4 es el valor para escribir por medio de la instrucción OUT. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1254 • CWE-782: Exposed IOCTL with Insufficient Access Control •
CVE-2020-10234
https://notcve.org/view.php?id=CVE-2020-10234
The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. \DosDevices\AscRegistryFilter and \Device\AscRegistryFilter are affected. El controlador del kernel AscRegistryFilter.sys en IObit Advanced SystemCare versión 13.2, permite a un usuario no privilegiado enviar un IOCTL hacia el controlador del dispositivo. • https://github.com/FULLSHADE/Kernel-exploits https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys https://www.iobit.com/en/advancedsystemcarefree.php •
CVE-2020-14990
https://notcve.org/view.php?id=CVE-2020-14990
IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges for file deletion by manipulating the Clean & Optimize feature with an NTFS junction and an Object Manager symbolic link. IOBit Advanced SystemCare Free versión 13.5.0.263, permite a usuarios locales conseguir privilegios para la eliminación de archivos al manipular la funcionalidad Clean & Optimize con una unión NTFS y un enlace simbólico de Object Manager • https://daniels-it-blog.blogspot.com/2020/06/arbitrary-file-deletion-in-iobit.html https://github.com/Daniel-itsec/AdvancedSystemCare • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2018-16711
https://notcve.org/view.php?id=CVE-2018-16711
IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402088) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for input. IObit Advanced SystemCare, que incluye Monitor_win10_x64.sys o Monitor_win7_x64.sys, en su versión 1.2.0.5 (y posiblemente también en versiones anteriores) permite que un usuario envíe una llamada IOCTL (0x9C402088) con un búfer que contiene contenidos definidos por el usuario. La subrutina del controlador ejecutará una instrucción wrmsr con el búfer del usuario como entrada. • https://github.com/DownWithUp/CVE-2018-16711 https://downwithup.github.io/CVEPosts.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-16712
https://notcve.org/view.php?id=CVE-2018-16712
IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send a specially crafted IOCTL 0x9C406104 to read physical memory. IObit Advanced SystemCare, que incluye Monitor_win10_x64.sys o Monitor_win7_x64.sys, en su versión 1.2.0.5 (y posiblemente también en versiones anteriores) permite que un usuario envíe una llamada IOCTL 0x9C406104 especialmente manipulado para leer memoria física. • https://github.com/DownWithUp/CVE-2018-16712 https://downwithup.github.io/CVEPosts.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •