Vulnerability Details : CVE-2020-10234
The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. \DosDevices\AscRegistryFilter and \Device\AscRegistryFilter are affected.
Products affected by CVE-2020-10234
- cpe:2.3:a:iobit:advanced_systemcare:13.2:*:*:*:*:windows:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-10234
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-10234
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
References for CVE-2020-10234
-
https://github.com/FULLSHADE/Kernel-exploits
GitHub - FULLSHADE/Kernel-exploits: Windows kernel driver exploitsThird Party Advisory
-
https://github.com/FULLSHADE/Kernel-exploits/tree/master/AscRegistryFilter.sys
Kernel-exploits/AscRegistryFilter.sys at master · FULLSHADE/Kernel-exploits · GitHubExploit;Third Party Advisory
-
https://www.iobit.com/en/advancedsystemcarefree.php
Macbooster ® Official Site - Download MacBooster 8 - Enjoy a Faster and More Secure MacProduct;Vendor Advisory
Jump to