cve/2024/CVE-2024-12658.md
2025-09-29 21:09:30 +02:00

20 lines
1.6 KiB
Markdown

### [CVE-2024-12658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12658)
![](https://img.shields.io/static/v1?label=Product&message=Advanced%20SystemCare%20Utimate&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=17.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=NULL%20Pointer%20Dereference&color=brightgreen)
### Description
A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This issue affects the function 0x8001E01C in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Eine problematische Schwachstelle wurde in IObit Advanced SystemCare Utimate bis 17.0.0 gefunden. Dies betrifft die Funktion 0x8001E01C in der Bibliothek AscRegistryFilter.sys der Komponente IOCTL Handler. Durch Manipulieren mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung.
### POC
#### Reference
- https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds