IObit Advanced SystemCare 10.0.2 contains an unquoted service path vulnerability in the AdvancedSystemCareService10 service that allows local attackers to escalate privileges. Attackers can place a malicious executable in the service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges.

Project Subscriptions

Vendors Products
Advanced Systemcare Subscribe
Advanced Systemcare Ultimate Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 04 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description IObit Advanced SystemCare 10.0.2 contains an unquoted service path vulnerability in the AdvancedSystemCareService10 service that allows local attackers to escalate privileges. Attackers can place a malicious executable in the service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges.
Title IObit Advanced SystemCare 10.0.2 Unquoted Service Path Privilege Escalation
First Time appeared Iobit
Iobit advanced Systemcare
Iobit advanced Systemcare Ultimate
Weaknesses CWE-428
CPEs cpe:2.3:a:iobit:advanced_systemcare:13.2:*:*:*:*:windows:*:*
cpe:2.3:a:iobit:advanced_systemcare:13.5.0.263:*:*:*:free:*:*:*
cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:free:*:*:*
cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:pro:*:*:*
cpe:2.3:a:iobit:advanced_systemcare_ultimate:-:*:*:*:*:*:*:*
cpe:2.3:a:iobit:advanced_systemcare_ultimate:10.0.2:*:*:*:*:*:*:*
cpe:2.3:a:iobit:advanced_systemcare_ultimate:14.2.0.220:*:*:*:*:*:*:*
cpe:2.3:a:iobit:advanced_systemcare_ultimate:17.0.0:*:*:*:*:*:*:*
Vendors & Products Iobit
Iobit advanced Systemcare
Iobit advanced Systemcare Ultimate
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-04T16:13:45.988Z

Reserved: 2026-04-04T13:37:50.146Z

Link: CVE-2016-20055

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-04T14:16:17.863

Modified: 2026-04-04T14:16:17.863

Link: CVE-2016-20055

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses