CVE-2025-66676

6.2 MEDIUM

📋 TL;DR

A vulnerability in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) by sending specially crafted requests. This affects users running the vulnerable version of IObit Unlocker software. The vulnerability could render the application unresponsive or crash it.

💻 Affected Systems

Products:
  • IObit Unlocker
Versions: v1.3.0.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific version mentioned; other versions may be unaffected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of IObit Unlocker, potentially requiring system reboot to restore functionality.

🟠

Likely Case

Temporary unavailability of IObit Unlocker functionality until the process is restarted.

🟢

If Mitigated

Minimal impact with proper network controls and updated software.

🌐 Internet-Facing: LOW (IObit Unlocker is typically not exposed to internet-facing interfaces)
🏢 Internal Only: MEDIUM (Could be exploited by internal attackers or malware on the same network)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub repository; exploitation appears straightforward based on CWE-400 description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IObit website for latest version (likely > v1.3.0.11)

Vendor Advisory: https://www.iobit.com/en/iobit-unlocker.php

Restart Required: No

Instructions:

1. Visit IObit Unlocker download page. 2. Download and install the latest version. 3. Replace the vulnerable v1.3.0.11 installation.

🔧 Temporary Workarounds

Network Access Control

Windows

Restrict network access to IObit Unlocker service/port to prevent remote exploitation

Use Windows Firewall to block inbound connections to IObit Unlocker

Disable Unlocker Service

Windows

Temporarily disable IObit Unlocker if not actively needed

sc stop "IObit Unlocker"
sc config "IObit Unlocker" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable version
  • Monitor for crash events or unusual process termination of IObit Unlocker

🔍 How to Verify

Check if Vulnerable:

Check IObit Unlocker version in Help > About or program properties

Check Version:

wmic product where name="IObit Unlocker" get version

Verify Fix Applied:

Confirm version is newer than v1.3.0.11 and test functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs for IObit Unlocker
  • Unexpected process termination events

Network Indicators:

  • Unusual network traffic to IObit Unlocker port
  • Multiple connection attempts to unlocker service

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="IObitUnlocker.exe"

🔗 References

📤 Share & Export