IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).
                
            References
                    | Link | Resource | 
|---|---|
| http://advanced.com | Not Applicable | 
| http://iobit.com | Vendor Advisory | 
| https://github.com/tomerpeled92/CVE/ | Third Party Advisory | 
| http://advanced.com | Not Applicable | 
| http://iobit.com | Vendor Advisory | 
| https://github.com/tomerpeled92/CVE/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2022-07-06 13:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-24138
Mitre link : CVE-2022-24138
CVE.ORG link : CVE-2022-24138
JSON object : View
Products Affected
                iobit
- advanced_systemcare
CWE
                
                    
                        
                        CWE-552
                        
            Files or Directories Accessible to External Parties
