CVE-2024-7325
📋 TL;DR
This vulnerability in IObit Driver Booster 11.0.0.0 allows local attackers to exploit an uncontrolled search path issue in the VCL120.BPL library component. Attackers could potentially execute arbitrary code by placing malicious files in locations the application searches. Only users of this specific software version are affected.
💻 Affected Systems
- IObit Driver Booster
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise, allowing attackers to install malware, steal credentials, or establish persistence.
Likely Case
Local user gains elevated privileges to execute arbitrary code within the context of the Driver Booster application.
If Mitigated
Limited impact with proper user account controls and application sandboxing in place.
🎯 Exploit Status
Requires local access and knowledge of the vulnerable search path. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
1. Check IObit website for updated version of Driver Booster
2. Uninstall current version if no patch available
3. Consider alternative driver update solutions
🔧 Temporary Workarounds
Remove vulnerable software
windowsUninstall IObit Driver Booster 11.0.0.0 to eliminate the vulnerability
Control Panel > Programs > Uninstall a program > Select IObit Driver Booster > Uninstall
Restrict file permissions
windowsSet strict permissions on directories the application searches to prevent malicious file placement
icacls "C:\Program Files\IObit\Driver Booster" /deny Users:(OI)(CI)W
🧯 If You Can't Patch
- Remove local user access to vulnerable systems
- Implement application whitelisting to prevent unauthorized executables
🔍 How to Verify
Check if Vulnerable:
Check installed programs for IObit Driver Booster version 11.0.0.0
Check Version:
wmic product where "name like 'IObit Driver Booster%'" get version
Verify Fix Applied:
Verify the software is either updated to a newer version or completely uninstalled
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Driver Booster directory
- Failed attempts to access restricted directories
Network Indicators:
- Not applicable - local vulnerability only
SIEM Query:
Process Creation where Image contains "Driver Booster" and CommandLine contains unusual parameters