{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-12662","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-12-16T08:36:58.081Z","datePublished":"2024-12-16T18:31:06.971Z","dateUpdated":"2024-12-16T19:07:08.015Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-12-16T18:31:06.971Z"},"title":"IObit Advanced SystemCare Utimate IOCTL AscRegistryFilter.sys 0x8001E040 null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"IObit","product":"Advanced SystemCare Utimate","versions":[{"version":"17.0","status":"affected"}],"modules":["IOCTL Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in IObit Advanced SystemCare Utimate up to 17.0.0. This affects the function 0x8001E040 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in IObit Advanced SystemCare Utimate bis 17.0.0 entdeckt. Sie wurde als problematisch eingestuft. Hiervon betroffen ist die Funktion 0x8001E040 in der Bibliothek AscRegistryFilter.sys der Komponente IOCTL Handler. Dank Manipulation mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}}],"timeline":[{"time":"2024-12-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-12-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-12-16T09:42:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"TopGun (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.288531","name":"VDB-288531 | IObit Advanced SystemCare Utimate IOCTL AscRegistryFilter.sys 0x8001E040 null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.288531","name":"VDB-288531 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.457163","name":"Submit #457163 | IOBit  Advanced SystemCare Utimate 17.0.0 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E040-NPD-DOS-15260437bb1e804e86b4e1de92ff0d09","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-16T19:06:46.542678Z","id":"CVE-2024-12662","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-16T19:07:08.015Z"}}]}}