{"api_version":"1","generated_at":"2026-05-05T13:29:00+00:00","cve":"CVE-2022-24138","urls":{"html":"https://cve.report/CVE-2022-24138","api":"https://cve.report/api/cve/CVE-2022-24138.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24138","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24138"},"summary":{"title":"CVE-2022-24138","description":"IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has \"rwx\" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-07-06 13:15:00","updated_at":"2022-07-14 01:09:00"},"problem_types":["CWE-552"],"metrics":[],"references":[{"url":"https://github.com/tomerpeled92/CVE/","name":"https://github.com/tomerpeled92/CVE/","refsource":"MISC","tags":[],"title":"GitHub - tomerpeled92/CVE","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://advanced.com","name":"http://advanced.com","refsource":"MISC","tags":[],"title":"Advanced Interconnections | Interconnect Solutions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://iobit.com","name":"http://iobit.com","refsource":"MISC","tags":[],"title":"Clean, Optimize, Speed Up and Secure PC - Freeware Download - IObit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24138","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24138","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24138","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iobit","cpe5":"advanced_systemcare","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"free","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24138","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iobit","cpe5":"advanced_systemcare","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-24138","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has \"rwx\" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN)."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://advanced.com","refsource":"MISC","name":"http://advanced.com"},{"url":"http://iobit.com","refsource":"MISC","name":"http://iobit.com"},{"refsource":"MISC","name":"https://github.com/tomerpeled92/CVE/","url":"https://github.com/tomerpeled92/CVE/"}]}},"nvd":{"publishedDate":"2022-07-06 13:15:00","lastModifiedDate":"2022-07-14 01:09:00","problem_types":["CWE-552"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:pro:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:free:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24138","Ordinal":"227392","Title":"CVE-2022-24138","CVE":"CVE-2022-24138","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24138","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}