6.5
CVSSv2

CVE-2018-16711

Published: 26/09/2018 Updated: 11/12/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send an IOCTL (0x9C402088) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for input.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

iobit advanced systemcare

Github Repositories

PoC code for CVE-2018-16711 (exploit by wrmsr)

CVE-2018-16711 PoC code for CVE-2018-16711 You can find out more @ downwithupgithubio/CVEPostshtml Vulnerable Software Download @: wwwiobitcom/en/advancedsystemcarefreephp

Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.

CVE-Stockpile Master list of all my vulnerability discoveries More information about individual CVEs can be at downwithupgithubio/CVEPostshtml The code in this repository is provided "as is", without warranty of any kind Exploits NOT included in This Repository CVE-2018-18714 Separate Repo CVE-2018-18026 Separate Repo CVE-2018-16713 Separate Repo CVE-2

Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.

CVE-Stockpile Master list of all my vulnerability discoveries More information about individual CVEs can be at downwithupgithubio/CVEPostshtml The code in this repository is provided "as is", without warranty of any kind Exploits NOT included in This Repository CVE-2018-18714 Separate Repo CVE-2018-18026 Separate Repo CVE-2018-16713 Separate Repo CVE-2

PoC in GitHub 2020 CVE-2020-0014 It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable This could lead to a local escalation of privilege with no additional execution privileges needed User action is needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Android-10Android ID: A-1286745

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr