CVE-2023-1626

5.3 MEDIUM

📋 TL;DR

This is a critical local privilege escalation vulnerability in Jianming Antivirus 16.2.2022.418. The vulnerability exists in the kvcore.sys driver's IoControlCode handler where memory corruption can be exploited by local attackers to execute arbitrary code with kernel privileges. Only users of this specific antivirus version are affected.

💻 Affected Systems

Products:
  • Jianming Antivirus
Versions: 16.2.2022.418
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with this specific antivirus version installed. The vulnerability is in the kernel driver kvcore.sys.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via kernel-level code execution, allowing attackers to install persistent malware, bypass security controls, and access all system resources.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM/administrator privileges, enabling installation of additional malware or credential theft.

🟢

If Mitigated

Limited impact if antivirus is patched or removed, though initial compromise would still require local access.

🌐 Internet-Facing: LOW - Requires local access to exploit, cannot be triggered remotely.
🏢 Internal Only: HIGH - Local attackers or malware with user-level access can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit code is publicly available on GitHub. Requires local execution privileges to trigger the vulnerable IoControlCode handler.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check for updates in Jianming Antivirus. 2. If no update is available, consider uninstalling the software. 3. Monitor vendor channels for security updates.

🔧 Temporary Workarounds

Uninstall Jianming Antivirus

windows

Remove the vulnerable software entirely to eliminate the attack surface

Control Panel > Programs > Uninstall a program > Select Jianming Antivirus > Uninstall

Restrict driver loading

windows

Prevent loading of the vulnerable kvcore.sys driver

sc stop jmfw
sc config jmfw start= disabled

🧯 If You Can't Patch

  • Implement strict local access controls and user privilege management
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check antivirus version in program settings or via 'wmic product get name,version' for Jianming Antivirus version 16.2.2022.418

Check Version:

wmic product where "name like '%Jianming%'" get name,version

Verify Fix Applied:

Verify antivirus version is updated beyond 16.2.2022.418 or that the software is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual driver loading events for kvcore.sys
  • Process creation with SYSTEM privileges from user accounts
  • Antivirus service crashes or unexpected restarts

Network Indicators:

  • No network indicators - purely local exploitation

SIEM Query:

EventID=7045 AND ServiceName="jmfw" OR ProcessName="kvcore.sys"

🔗 References

📤 Share & Export