Lucene search

K
cveMitreCVE-2018-10169
HistoryApr 16, 2018 - 9:29 p.m.

CVE-2018-10169

2018-04-1621:29:00
CWE-732
mitre
web.nvd.nist.gov
32
protonvpn
windows
privilege escalation
vulnerability
netnamedpipe
openvpn
dynamic library plugin
system user
cve-2018-10169

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.004

Percentile

72.4%

ProtonVPN 1.3.3 for Windows suffers from a SYSTEM privilege escalation vulnerability through the “ProtonVPN Service” service. This service establishes an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The “Connect” method accepts a class instance argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection. This plugin will execute code in the context of the SYSTEM user.

Affected configurations

Nvd
Node
protonmailprotonvpnMatch1.3.3windows
VendorProductVersionCPE
protonmailprotonvpn1.3.3cpe:2.3:a:protonmail:protonvpn:1.3.3:*:*:*:*:windows:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.004

Percentile

72.4%