Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:goldenfrog:vyprvpn:2.12.1.8015:*:*:*:*:windows:*:*", "matchCriteriaId": "9C938762-A661-4B88-AD03-DB155E3603E6", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Golden Frog VyprVPN 2.12.1.8015 for Windows suffers from a SYSTEM privilege escalation vulnerability through the \"VyprVPN\" service. This service establishes a NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. The \"SetProperty\" method allows an attacker to configure the \"AdditionalOpenVpnParameters\" property and control the OpenVPN command line. Using the OpenVPN \"plugin\" parameter, an attacker may specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. This attack may be conducted using \"VyprVPN Free\" account credentials and the VyprVPN Desktop Client."}, {"lang": "es", "value": "Golden Frog VyprVPN 2.12.1.8015 para Windows sufre de una vulnerabilidad de escalado de privilegios SYSTEM a trav\u00e9s del servicio \"VyprVPN\". Este servicio establece un endpoint NetNamedPipe que permite que las aplicaciones se conecten y llamen a m\u00e9todos expuestos de forma p\u00fablica. El m\u00e9todo \"SetProperty\" permite que un atacante configure la propiedad \"AdditionalOpenVpnParameters\" y controle la l\u00ednea de comandos de OpenVPN. Mediante el par\u00e1metro \"plugin\" de OpenVPN, un atacante puede especificar un plugin de biblioteca din\u00e1mica que deber\u00eda ejecutarse para cada nuevo intento de conexi\u00f3n de VPN. Este plugin ejecutar\u00e1 c\u00f3digo en el contexto del usuario SYSTEM. Este ataque puede realizarse usando credenciales de la cuenta \"VyprVPN Free\" y el cliente VyprVPN Desktop."}], "id": "CVE-2018-10645", "lastModified": "2024-11-21T03:41:43.147", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-05-02T07:29:00.400", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-025.md"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/VerSprite/research/blob/master/advisories/VS-2018-025.md"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-732"}], "source": "nvd@nist.gov", "type": "Primary"}]}