Lucene search

K
cvelistTalosCVELIST:CVE-2018-4010
HistorySep 07, 2018 - 12:00 a.m.

CVE-2018-4010

2018-09-0700:00:00
talos
www.cve.org

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.1%

An exploitable code execution vulnerability exists in the connect functionality of ProtonVPN VPN client 1.5.1. A specially crafted configuration file can cause a privilege escalation, resulting in the ability to execute arbitrary commands with the system’s privileges.

CNA Affected

[
  {
    "product": "ProtonVPN",
    "vendor": "Talos",
    "versions": [
      {
        "status": "affected",
        "version": "ProtonVPN VPN Client 1.5.1"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

45.1%

Related for CVELIST:CVE-2018-4010