{"id": "PACKETSTORM:163320", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation", "description": "", "published": "2021-06-30T00:00:00", "modified": "2021-06-30T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html", "reporter": "Florian Bogner", "references": [], "cvelist": ["CVE-2021-35523"], "immutableFields": [], "lastseen": "2021-06-30T15:45:52", "viewCount": 56, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-35523"]}, {"type": "zdt", "idList": ["1337DAY-ID-36493"]}], "rev": 4}, "score": {"value": 4.4, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-35523"]}, {"type": "zdt", "idList": ["1337DAY-ID-36493"]}]}, "exploitation": null, "vulnersScore": 4.4}, "sourceHref": "https://packetstormsecurity.com/files/download/163320/securepointsslvpn2030-escalate.txt", "sourceData": "`Local Privilege Escalation in Securepoint SSL VPN Client 2.0.30 \n \nMetadata \n=================================================== \nRelease Date: 29-Jun-2021 \nAuthor: Florian Bogner @ https://bee-itsecurity.at \nAffected product: Securepoint SSL VPN Client \nFixed in: version 2.0.32 \nTested on: Windows 10 x64 fully patched \nCVE: CVE-2021-35523 \nURL: https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/ \nVulnerability Status: Fixed with new release \n \nVulnerability Description (copied from the CVE Details) \n=================================================== \nSecurepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under \"%APPDATA%\\Securepoint SSL VPN\" and add a external script file that is executed as privileged user. \n \nA full vulnerability description is available here: https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/ \n \nSuggested Solution \n=================================================== \nEnd-users should update to the latest available version. \n \nDisclosure Timeline \n=================================================== \n14.04.2021: The vulnerability was discovered and reported to security@securepoint.de \n15.04.2021: The report was triaged \n26.04.2021: Securepoint SSL VPN Client Version 2.0.32 was released, which contains an initial fix for the vulnerability \n23.06.2021: Securepoint SSL VPN Client Version 2.0.34 was released, which contains additional security measures. \n28.06.2021: CVE-2021-35523 was assigned: https://nvd.nist.gov/vuln/detail/CVE-2021-35523 \n29.06.2021: Responsible disclosure in cooperation with Securepoint: https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34 \n \n___________ \n \nFlorian Bogner \nInformation Security Expert, Speaker \n \nBee IT Security Consulting GmbH \nNibelungenstra\u00dfe 37 \n3123 A-Schweinern \n \nMail: florian.bogner@bee-itsecurity.at \nWeb: https://www.bee-itsecurity.at \n \n \n \n \n \n`\n", "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646054855}}
{"cve": [{"lastseen": "2022-03-23T18:49:19", "description": "Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under \"%APPDATA%\\Securepoint SSL VPN\" and add a external script file that is executed as privileged user.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-06-28T17:15:00", "type": "cve", "title": "CVE-2021-35523", "cwe": ["CWE-269"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-35523"], "modified": "2021-07-02T16:26:00", "cpe": [], "id": "CVE-2021-35523", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35523", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": []}], "zdt": [{"lastseen": "2021-12-21T11:40:30", "description": "Securepoint SSL VPN Client version 2.0.30 suffers from a local privilege escalation vulnerability.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-06-30T00:00:00", "type": "zdt", "title": "Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation Vulnerability", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-35523"], "modified": "2021-06-30T00:00:00", "id": "1337DAY-ID-36493", "href": "https://0day.today/exploit/description/36493", "sourceData": "Local Privilege Escalation in Securepoint SSL VPN Client 2.0.30\n\nMetadata\n===================================================\nRelease Date: 29-Jun-2021\nAuthor: Florian Bogner @ https://bee-itsecurity.at\nAffected product: Securepoint SSL VPN Client \nFixed in: version 2.0.32\nTested on: Windows 10 x64 fully patched\nCVE: CVE-2021-35523\nURL: https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/\nVulnerability Status: Fixed with new release\n\nVulnerability Description (copied from the CVE Details)\n===================================================\nSecurepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under \"%APPDATA%\\Securepoint SSL VPN\" and add a external script file that is executed as privileged user.\n\nA full vulnerability description is available here: https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/ \n\nSuggested Solution\n===================================================\nEnd-users should update to the latest available version.\n\nDisclosure Timeline\n===================================================\n14.04.2021: The vulnerability was discovered and reported to [email\u00a0protected]\n15.04.2021: The report was triaged\n26.04.2021: Securepoint SSL VPN Client Version 2.0.32 was released, which contains an initial fix for the vulnerability\n23.06.2021: Securepoint SSL VPN Client Version 2.0.34 was released, which contains additional security measures.\n28.06.2021: CVE-2021-35523 was assigned: https://nvd.nist.gov/vuln/detail/CVE-2021-35523 \n29.06.2021: Responsible disclosure in cooperation with Securepoint: https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34\n\n", "sourceHref": "https://0day.today/exploit/36493", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}