Vulnerability CVE-2021-35523


Published: 2021-06-28

Description:
Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation
Florian Bogner
30.06.2021

Type:

CWE-269

(Improper Privilege Management)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Securepoint -> Openvpn-client 

 References:
https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34
https://bogner.sh/2021/04/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
http://seclists.org/fulldisclosure/2021/Jun/59
http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html

Copyright 2024, cxsecurity.com

 

Back to Top