{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0222","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-04T08:52:54.244Z","datePublished":"2025-01-05T15:31:04.500Z","dateUpdated":"2025-01-06T14:45:15.189Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-05T15:31:04.500Z"},"title":"IObit Protected Folder IOCTL IUProcessFilter.sys 0x8001E004 null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"IObit","product":"Protected Folder","versions":[{"version":"13.6.0.0","status":"affected"},{"version":"13.6.0.1","status":"affected"},{"version":"13.6.0.2","status":"affected"},{"version":"13.6.0.3","status":"affected"},{"version":"13.6.0.4","status":"affected"},{"version":"13.6.0.5","status":"affected"}],"modules":["IOCTL Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine problematische Schwachstelle wurde in IObit Protected Folder bis 13.6.0.5 gefunden. Es geht hierbei um die Funktion 0x8001E000/0x8001E004 in der Bibliothek IUProcessFilter.sys der Komponente IOCTL Handler. Durch Beeinflussen mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.6,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}}],"timeline":[{"time":"2025-01-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-04T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-04T09:58:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"TopGun (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.290201","name":"VDB-290201 | IObit Protected Folder IOCTL IUProcessFilter.sys 0x8001E004 null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.290201","name":"VDB-290201 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.466956","name":"Submit #466956 | IOBit  Uninstaller 13.6.0.5 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://shareforall.notion.site/IOBit-Uninstaller-IUProcessFilter-0x8001E000-NPD-DOS-15260437bb1e809c81bbc484c53b17bc","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-06T14:44:59.735651Z","id":"CVE-2025-0222","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-06T14:45:15.189Z"}}]}}