CVE-2025-26125

7.3 HIGH

📋 TL;DR

This vulnerability in IObit Malware Fighter's IMFForceDelete driver allows attackers to delete arbitrary files and escalate privileges through an exposed ioctl interface. It affects users of IObit Malware Fighter v12.1.0 on Windows systems. Attackers can leverage this to gain SYSTEM-level access on compromised systems.

💻 Affected Systems

Products:
  • IObit Malware Fighter
Versions: v12.1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the IMFForceDelete.sys driver component. All installations of v12.1.0 are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing deletion of critical system files, installation of persistent malware, and complete control over the affected machine.

🟠

Likely Case

Local privilege escalation from a lower-privileged user account to SYSTEM, enabling file deletion, persistence establishment, and bypassing security controls.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced, though the vulnerability still exists.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access or initial compromise.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, malware, etc.), they can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof-of-concept code is available on GitHub. Exploitation requires local access and some technical knowledge to craft ioctl calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v12.2.0 or later

Vendor Advisory: https://www.iobit.com/en/malware-fighter.php

Restart Required: No

Instructions:

1. Open IObit Malware Fighter. 2. Click 'Check for Updates' in the main interface. 3. Install any available updates. 4. Verify version is 12.2.0 or higher.

🔧 Temporary Workarounds

Disable or remove IMFForceDelete.sys driver

Windows

Prevents exploitation by removing the vulnerable driver component

sc stop IMFForceDelete
sc delete IMFForceDelete
del C:\Windows\System32\drivers\IMFForceDelete.sys

🧯 If You Can't Patch

  • Implement application control policies to block execution of IObit Malware Fighter
  • Enforce least privilege principles to limit initial access opportunities

🔍 How to Verify

Check if Vulnerable:

Check if IMFForceDelete.sys driver exists in C:\Windows\System32\drivers\ and IObit Malware Fighter version is 12.1.0

Check Version:

Open IObit Malware Fighter and check 'About' section or look at program files version

Verify Fix Applied:

Verify IObit Malware Fighter version is 12.2.0 or higher and IMFForceDelete.sys driver has been updated or removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual ioctl calls to IMFForceDelete.sys driver
  • File deletion events from SYSTEM account
  • Driver loading events for IMFForceDelete

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

EventID=4656 OR EventID=4663 WHERE ObjectName contains 'IMFForceDelete' OR ProcessName contains 'IMFForceDelete'

🔗 References

📤 Share & Export