An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 05:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 - Third Party Advisory, US Government Resource |
18 Oct 2022, 13:38
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-610 | |
CPE | cpe:2.3:a:perfact:openvpn-client:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 - Third Party Advisory, US Government Resource |
14 Oct 2022, 17:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-14 17:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27406
Mitre link : CVE-2021-27406
CVE.ORG link : CVE-2021-27406
JSON object : View
Products Affected
perfact
- openvpn-client