{"api_version":"1","generated_at":"2026-05-05T13:27:33+00:00","cve":"CVE-2023-1641","urls":{"html":"https://cve.report/CVE-2023-1641","api":"https://cve.report/api/cve/CVE-2023-1641.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1641","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1641"},"summary":{"title":"CVE-2023-1641","description":"A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-03-26 22:15:00","updated_at":"2023-11-07 04:04:00"},"problem_types":["CWE-404"],"metrics":[],"references":[{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641","refsource":"MISC","tags":[],"title":"WindowsKernelVuln/CVE-2023-1641 at master · zeze-zeze/WindowsKernelVuln · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned35","refsource":"MISC","tags":[],"title":"WindowsKernelVuln/unassigned35 at master · zeze-zeze/WindowsKernelVuln · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view","name":"https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view","refsource":"MISC","tags":[],"title":"https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view","mime":"text/html","httpstatus":"429","archivestatus":"404"},{"url":"https://vuldb.com/?ctiid.224021","name":"https://vuldb.com/?ctiid.224021","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://vuldb.com/?id.224021","name":"https://vuldb.com/?id.224021","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1641","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1641","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1641","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"iobit","cpe5":"malware_fighter","cpe6":"9.4.0.776","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1641","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability."},{"lang":"deu","value":"Eine Schwachstelle wurde in IObit Malware Fighter 9.4.0.776 entdeckt. Sie wurde als problematisch eingestuft. Es geht hierbei um die Funktion 0x222018 in der Bibliothek ObCallbackProcess.sys der Komponente IOCTL Handler. Mittels Manipulieren mit unbekannten Daten kann eine denial of service-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-404 Denial of Service","cweId":"CWE-404"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"IObit","product":{"product_data":[{"product_name":"Malware Fighter","version":{"version_data":[{"version_affected":"=","version_value":"9.4.0.776"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.224021","refsource":"MISC","name":"https://vuldb.com/?id.224021"},{"url":"https://vuldb.com/?ctiid.224021","refsource":"MISC","name":"https://vuldb.com/?ctiid.224021"},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641","refsource":"MISC","name":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641"},{"url":"https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view","refsource":"MISC","name":"https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view"}]},"credits":[{"lang":"en","value":"Zeze7w (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":4.6,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}]}},"nvd":{"publishedDate":"2023-03-26 22:15:00","lastModifiedDate":"2023-11-07 04:04:00","problem_types":["CWE-404"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:iobit:malware_fighter:9.4.0.776:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}