{"uuid": "8f004948-d2f5-4c96-90f8-10df2831b959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-9G72-VRH2-4XQW", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/136", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-9g72-vrh2-4xqw\n\ud83d\udd17 Aliases: CVE-2025-0222\n\ud83d\udd39 Details: A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udd22 Severity: CVSS_V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, CVSS_V4: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\n\ud83d\uddd3\ufe0f Modified: 2025-01-05T18:30:35Z\n\ud83d\uddd3\ufe0f Published: 2025-01-05T18:30:35Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-404\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0222\n2. https://shareforall.notion.site/IOBit-Uninstaller-IUProcessFilter-0x8001E000-NP-OS-1526043bb1e809c81bbc484c53b1bc\n3. https://vuldb.com/?ctiid.290201\n4. https://vuldb.com/?id.290201\n5. https://vuldb.com/?submit.466956", "creation_timestamp": "2025-01-05T18:40:52.000000Z"}