{"api_version":"1","generated_at":"2026-05-05T13:29:00+00:00","cve":"CVE-2022-24139","urls":{"html":"https://cve.report/CVE-2022-24139","api":"https://cve.report/api/cve/CVE-2022-24139.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24139","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24139"},"summary":{"title":"CVE-2022-24139","description":"In IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -> SYSTEM or from Local ADMIN-> Domain ADMIN depending on the user and named pipe that is used.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-07-06 13:15:00","updated_at":"2022-07-15 16:47:00"},"problem_types":["CWE-668"],"metrics":[],"references":[{"url":"https://github.com/tomerpeled92/CVE/","name":"https://github.com/tomerpeled92/CVE/","refsource":"MISC","tags":[],"title":"GitHub - tomerpeled92/CVE","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://advanced.com","name":"http://advanced.com","refsource":"MISC","tags":[],"title":"Advanced Interconnections | Interconnect Solutions","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://iobit.com","name":"http://iobit.com","refsource":"MISC","tags":[],"title":"Clean, Optimize, Speed Up and Secure PC - Freeware Download - IObit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24139","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24139","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24139","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iobit","cpe5":"advanced_system_care","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"free","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24139","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iobit","cpe5":"advanced_system_care","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"pro","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-24139","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In IOBit Advanced System Care (AscService.exe) 15, an attacker with SEImpersonatePrivilege can create a named pipe with the same name as one of ASCService's named pipes. ASCService first tries to connect before trying to create the named pipes, because of that during login the service will try to connect to the attacker which will lead to either escalation of privileges (through token manipulation and ImpersonateNamedPipeClient() ) from ADMIN -> SYSTEM or from Local ADMIN-> Domain ADMIN depending on the user and named pipe that is used."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://advanced.com","refsource":"MISC","name":"http://advanced.com"},{"url":"http://iobit.com","refsource":"MISC","name":"http://iobit.com"},{"refsource":"MISC","name":"https://github.com/tomerpeled92/CVE/","url":"https://github.com/tomerpeled92/CVE/"}]}},"nvd":{"publishedDate":"2022-07-06 13:15:00","lastModifiedDate":"2022-07-15 16:47:00","problem_types":["CWE-668"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:pro:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iobit:advanced_system_care:15:*:*:*:free:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24139","Ordinal":"227393","Title":"CVE-2022-24139","CVE":"CVE-2022-24139","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24139","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}