Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

[VS-2018-025] VyprVPN for Windows Privilege Escalation Vulnerability

CVE ID

CVE-2018-10645

CVSS Score

Pending

Vendor

Golden Frog

Product

VyprVPN

Product Version

2.12.1.8015

Vulnerability Details

VyprVPN for Windows suffers from a SYSTEM privilege escalation vulnerability through the VyprVPN service. This service establishes an NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. The SetProperty method allows an attacker to configure the AdditionalOpenVpnParameters property and control the OpenVpn command line. Using the OpenVPN plugin parameter, an attacker may specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. This attack may be conducted using VyprVPN Free account credentials and the VyprVPN Desktop Client.

Vendor Response

A release is scheduled.

Disclosure Timeline

  • 04-09-2018 - Vendor disclosure via email
  • 04-09-2018 - Vendor notified via Facebook
  • 04-10-2018 - Vendor response via email: Vulnerability resolved in latest release
  • 04-16-2018 - VerSprite verifies vulnerability unresolved
  • 04-17-2018 - VerSprite notifies the vendor of findings
  • 04-25-2018 - Vendor followup
  • 04-26-2018 - Vendor response: A release is scheduled that resolves this vulnerability
  • 05-01-2018 - Vendor notified of the advisory release

Credit

Fabius Watson of VerSprite Security (@FabiusArtrel)