{"api_version":"1","generated_at":"2026-04-23T04:10:46+00:00","cve":"CVE-2023-1630","urls":{"html":"https://cve.report/CVE-2023-1630","api":"https://cve.report/api/cve/CVE-2023-1630.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1630","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1630"},"summary":{"title":"CVE-2023-1630","description":"A vulnerability, which was classified as problematic, has been found in JiangMin Antivirus 16.2.2022.418. Affected by this issue is the function 0x222000 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-03-25 12:15:00","updated_at":"2023-11-07 04:04:00"},"problem_types":["CWE-404"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.224012","name":"https://vuldb.com/?ctiid.224012","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630","refsource":"MISC","tags":[],"title":"WindowsKernelVuln/CVE-2023-1630 at master · zeze-zeze/WindowsKernelVuln · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view","name":"https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view","refsource":"MISC","tags":[],"title":"https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view","mime":"text/html","httpstatus":"429","archivestatus":"404"},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29","refsource":"MISC","tags":[],"title":"WindowsKernelVuln/unassigned29 at master · zeze-zeze/WindowsKernelVuln · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.224012","name":"https://vuldb.com/?id.224012","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1630","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1630","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1630","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jiangmin","cpe5":"jiangmin_antivirus","cpe6":"16.2.2022.418","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1630","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, has been found in JiangMin Antivirus 16.2.2022.418. Affected by this issue is the function 0x222000 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012."},{"lang":"deu","value":"Eine problematische Schwachstelle wurde in JiangMin Antivirus 16.2.2022.418 entdeckt. Dies betrifft die Funktion 0x222000 in der Bibliothek kvcore.sys der Komponente IOCTL Handler. Durch Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-404 Denial of Service","cweId":"CWE-404"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"JiangMin","product":{"product_data":[{"product_name":"Antivirus","version":{"version_data":[{"version_affected":"=","version_value":"16.2.2022.418"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.224012","refsource":"MISC","name":"https://vuldb.com/?id.224012"},{"url":"https://vuldb.com/?ctiid.224012","refsource":"MISC","name":"https://vuldb.com/?ctiid.224012"},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630","refsource":"MISC","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630"},{"url":"https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view","refsource":"MISC","name":"https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view"}]},"credits":[{"lang":"en","value":"Zeze7w (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":4.6,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}]}},"nvd":{"publishedDate":"2023-03-25 12:15:00","lastModifiedDate":"2023-11-07 04:04:00","problem_types":["CWE-404"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jiangmin:jiangmin_antivirus:16.2.2022.418:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}