6.8
CVSSv2

CVE-2018-16712

Published: 26/09/2018 Updated: 27/12/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 607
Vector: AV:N/AC:L/Au:S/C:C/I:N/A:N

Vulnerability Summary

IObit Advanced SystemCare, which includes Monitor_win10_x64.sys or Monitor_win7_x64.sys, 1.2.0.5 (and possibly earlier versions) allows a user to send a specially crafted IOCTL 0x9C406104 to read physical memory.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

iobit advanced systemcare

Github Repositories

PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)

CVE-2018-16712 PoC Code for CVE-2018-16712 You can find out more @ downwithupgithubio/CVEPostshtml Vulnerable Software Download @: wwwiobitcom/en/advancedsystemcarefreephp

Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.

CVE-Stockpile Master list of all my vulnerability discoveries More information about individual CVEs can be at downwithupgithubio/CVEPostshtml The code in this repository is provided "as is", without warranty of any kind Exploits NOT included in This Repository CVE-2018-18714 Separate Repo CVE-2018-18026 Separate Repo CVE-2018-16713 Separate Repo CVE-2

Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.

CVE-Stockpile Master list of all my vulnerability discoveries More information about individual CVEs can be at downwithupgithubio/CVEPostshtml The code in this repository is provided "as is", without warranty of any kind Exploits NOT included in This Repository CVE-2018-18714 Separate Repo CVE-2018-18026 Separate Repo CVE-2018-16713 Separate Repo CVE-2

PoC in GitHub 2020 CVE-2020-0014 It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable This could lead to a local escalation of privilege with no additional execution privileges needed User action is needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Android-10Android ID: A-1286745

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr