ISS BlackICE PC Protection Filelock protection bypass Vulnerability

Risk: Medium
Local: Yes
Remote: No
CWE: CWE-Other

CVSS Base Score: 2.1/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Hello, We would like to inform you about a vulnerability in ISS BlackICE PC Protection. Description: BlackICE PC Protection protects its files against manipulation by malicious software. Its critical files like its database of trusted applications or firewall configuration are protected. The list of protected files is stored in filelock.txt in the BlackICE installation directory. If this file is deleted files mentioned in filelock.txt are not protected any more and can be changed by malicious applications. The implemented protection allows malicious applications to delete this file using native API function ZwDeleteFile. This can result in a bypass of all BlackICE protection mechanisms because its internal componenets can be replaced with fake copies. The situation is even easier for the attacker because the component control fails to recognize fake components in BlackICE processes. Vulnerable software: * BlackICE PC Protection 3.6.cpu * BlackICE PC Protection 3.6.cpj * probably all versions of BlackICE PC Protection 3.6 * possibly older versions of BlackICE PC Protection More details and a proof of concept including source code is available here: ass.php Regards, -- Matousec - Transparent security Research

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top