Description
IObit Malware Fighter 4.3.1 contains an unquoted service path vulnerability in the IMFservice and LiveUpdateSvc services that allows local attackers to escalate privileges. Attackers can insert a malicious executable file in the unquoted service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges.
Published: 2026-04-04
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch
AI Analysis

Impact

IObit Malware Fighter 4.3.1 exposes an unquoted service path vulnerability in the IMFservice and LiveUpdateSvc services. The flaw, categorized as CWE‑428, allows a local attacker to supply a path that is interpreted by the operating system, enabling the attacker to drop a malicious executable before the intended service binary. When the service restarts or the system reboots, that executable runs with LocalSystem privileges, allowing the attacker to gain full control of the machine.

Affected Systems

The vulnerability affects the IObit Malware Fighter product family, particularly version 4.3.1 and other 4.x releases that use the same IMFservice and LiveUpdateSvc binaries. Venders are IObit, and any installation of the application on a Windows workstation is potentially impacted when the services are configured with unquoted paths.

Risk and Exploitability

The CVSS base score of 8.5 indicates high severity. Because the exploit requires only local user access and no network interaction, it is feasible in environments where end users have interactive access to the machine. The EPSS score is not available, but the lack of external exposure does not diminish the risk for typical desktop deployments. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, yet its impact remains significant for users who have not upgraded to a version that properly quotes service paths.

Generated by OpenCVE AI on April 4, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest IObit Malware Fighter release that quotes the service paths and eliminates the privilege escalation route.
  • If an upgrade is not immediately possible, stop the IMFservice and LiveUpdateSvc services to prevent the execution of malicious code.
  • Delete or rename the service binaries that reside in the unquoted path to block the resolution mechanism.
  • Monitor IObit’s security advisories for updates and apply them as soon as they become available.

Generated by OpenCVE AI on April 4, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:iobit:malware_fighter:*:*:*:*:free:*:*:*

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description IObit Malware Fighter 4.3.1 contains an unquoted service path vulnerability in the IMFservice and LiveUpdateSvc services that allows local attackers to escalate privileges. Attackers can insert a malicious executable file in the unquoted service path and trigger privilege escalation when the service restarts or the system reboots, executing code with LocalSystem privileges.
Title IObit Malware Fighter 4.3.1 Unquoted Service Path Privilege Escalation
First Time appeared Iobit
Iobit malware Fighter
Weaknesses CWE-428
CPEs cpe:2.3:a:iobit:malware_fighter:11.0.0.1274:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:4.0.3.22:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:4.2.02425:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:4.5.03457:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:8.0.2.547:*:*:*:-:*:*:*
cpe:2.3:a:iobit:malware_fighter:8.0.2.547:*:*:*:pro:*:*:*
cpe:2.3:a:iobit:malware_fighter:9.2:*:*:*:*:*:*:*
cpe:2.3:a:iobit:malware_fighter:9.4.0.776:*:*:*:*:*:*:*
Vendors & Products Iobit
Iobit malware Fighter
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Iobit Malware Fighter
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:28:43.356Z

Reserved: 2026-04-04T13:42:51.909Z

Link: CVE-2016-20059

cve-icon Vulnrichment

Updated: 2026-04-06T15:20:15.879Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-04T14:16:18.557

Modified: 2026-04-27T13:27:25.357

Link: CVE-2016-20059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:52Z

Weaknesses