{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1491","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-18T20:20:35.519Z","datePublished":"2023-03-18T22:00:05.735Z","dateUpdated":"2024-08-02T05:49:11.698Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-21T09:32:49.027Z"},"title":"Max Secure Anti Virus Plus IoControlCode MaxCryptMon.sys 0x220020 access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"CWE-284 Improper Access Controls"}]}],"affected":[{"vendor":"Max Secure","product":"Anti Virus Plus","versions":[{"version":"19.0.2.1","status":"affected"}],"modules":["IoControlCode Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been classified as critical. This affects the function 0x220020 in the library MaxCryptMon.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-223377 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in Max Secure Anti Virus Plus 19.0.2.1 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion 0x220020 in der Bibliothek MaxCryptMon.sys der Komponente IoControlCode Handler. Dank der Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.4,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.4,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":3.2,"vectorString":"AV:L/AC:L/Au:S/C:N/I:P/A:P"}}],"timeline":[{"time":"2023-03-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-18T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-03-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-11T19:50:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Zeze7w (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.223377","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.223377","tags":["signature","permissions-required"]},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491","tags":["related"]},{"url":"https://drive.google.com/file/d/1-h-6ijBvucNU-dYglWW5n4l2ys-MDAF9/view","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:49:11.698Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.223377","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.223377","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1491","tags":["related","x_transferred"]},{"url":"https://drive.google.com/file/d/1-h-6ijBvucNU-dYglWW5n4l2ys-MDAF9/view","tags":["exploit","x_transferred"]}]}]}}