Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:free:*:*:*", "matchCriteriaId": "FF6E8D50-6B8B-43AA-9338-1A4DBE83DB34", "vulnerable": true}, {"criteria": "cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:pro:*:*:*", "matchCriteriaId": "1DA08A7C-9D84-4C40-84B4-C0541BCAB266", "vulnerable": true}, {"criteria": "cpe:2.3:a:iobit:driver_booster:9:*:*:*:*:*:*:*", "matchCriteriaId": "B9D2756E-6714-4D24-B06E-13AC9E1872A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:iobit:itop_screen_recorder:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1EE3AD53-D48B-4FA0-BCAB-FDDBA8217F73", "vulnerable": true}, {"criteria": "cpe:2.3:a:iobit:itop_screenshot:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED706F7F-0675-499C-9F7D-D69563139413", "vulnerable": true}, {"criteria": "cpe:2.3:a:iobit:itop_vpn:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D35825EC-63C8-4374-B4F4-FD88193C7895", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "IOBit Advanced System Care 15, iTop Screen Recorder 2.1, iTop VPN 3.2, Driver Booster 9, and iTop Screenshot sends HTTP requests in their update procedure in order to download a config file. After downloading the config file, the products will parse the HTTP location of the update from the file and will try to install the update automatically with ADMIN privileges. An attacker Intercepting this communication can supply the product a fake config file with malicious locations for the updates thus gaining a remote code execution on an endpoint."}, {"lang": "es", "value": "IOBit Advanced System Care versi\u00f3n 15, iTop Screen Recorder versi\u00f3n 2.1, iTop VPN versi\u00f3n 3.2, Driver Booster versi\u00f3n 9 e iTop Screenshot env\u00edan peticiones HTTP en su procedimiento de actualizaci\u00f3n para descargar un archivo de configuraci\u00f3n. Despu\u00e9s de descargar el archivo de configuraci\u00f3n, los productos analizar\u00e1n la ubicaci\u00f3n HTTP de la actualizaci\u00f3n desde el archivo e intentar\u00e1n instalar la actualizaci\u00f3n autom\u00e1ticamente con privilegios de administrador. Un atacante que intercepte esta comunicaci\u00f3n puede suministrar al producto un archivo de configuraci\u00f3n falso con ubicaciones maliciosas para las actualizaciones, obteniendo as\u00ed una ejecuci\u00f3n de c\u00f3digo remota en un endpoint"}], "id": "CVE-2022-24140", "lastModified": "2024-11-21T06:49:53.420", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.7, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-07-06T13:15:09.313", "references": [{"source": "cve@mitre.org", "tags": ["Not Applicable"], "url": "http://advanced.com"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://iobit.com"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/tomerpeled92/CVE/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Not Applicable"], "url": "http://advanced.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://iobit.com"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/tomerpeled92/CVE/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-494"}], "source": "nvd@nist.gov", "type": "Primary"}]}