CyberGhostVPNSetup.exe (Windows installer) is signed using the weak cryptographic hash algorithm SHA-1, which is vulnerable to collision attacks. This allows a malicious actor to craft a fake installer with a forged SHA-1 certificate that may still be accepted by Windows signature verification mechanisms, particularly on systems without strict SmartScreen or trust policy enforcement. Additionally, the installer lacks High Entropy Address Space Layout Randomization (ASLR), as confirmed by BinSkim (BA2015 rule) and repeated WinDbg analysis. The binary consistently loads into predictable memory ranges, increasing the success rate of memory corruption exploits. These two misconfigurations, when combined, significantly lower the bar for successful supply-chain style attacks or privilege escalation through fake installers.
References
Configurations
No configuration.
History
05 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-327 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.4 |
Summary |
|
04 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-04 21:15
Updated : 2025-08-05 14:34
NVD link : CVE-2025-51726
Mitre link : CVE-2025-51726
CVE.ORG link : CVE-2025-51726
JSON object : View
Products Affected
No product.
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm