Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iobit advanced System Care
|
|
| CPEs | cpe:2.3:a:iobit:advanced_system_care:*:*:*:*:free:*:*:* | |
| Vendors & Products |
Iobit advanced System Care
|
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IObit Advanced SystemCare 10.0.2 contains an unquoted service path vulnerability in the AdvancedSystemCareService10 service that allows local attackers to escalate privileges. Attackers can place a malicious executable in the service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges. | |
| Title | IObit Advanced SystemCare 10.0.2 Unquoted Service Path Privilege Escalation | |
| First Time appeared |
Iobit
Iobit advanced Systemcare Iobit advanced Systemcare Ultimate |
|
| Weaknesses | CWE-428 | |
| CPEs | cpe:2.3:a:iobit:advanced_systemcare:13.2:*:*:*:*:windows:*:* cpe:2.3:a:iobit:advanced_systemcare:13.5.0.263:*:*:*:free:*:*:* cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:free:*:*:* cpe:2.3:a:iobit:advanced_systemcare:15:*:*:*:pro:*:*:* cpe:2.3:a:iobit:advanced_systemcare_ultimate:-:*:*:*:*:*:*:* cpe:2.3:a:iobit:advanced_systemcare_ultimate:10.0.2:*:*:*:*:*:*:* cpe:2.3:a:iobit:advanced_systemcare_ultimate:14.2.0.220:*:*:*:*:*:*:* cpe:2.3:a:iobit:advanced_systemcare_ultimate:17.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Iobit
Iobit advanced Systemcare Iobit advanced Systemcare Ultimate |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-06T15:42:28.084Z
Reserved: 2026-04-04T13:37:50.146Z
Link: CVE-2016-20055
Updated: 2026-04-06T15:42:22.423Z
Status : Analyzed
Published: 2026-04-04T14:16:17.863
Modified: 2026-04-14T19:09:27.900
Link: CVE-2016-20055
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:30:09Z