NordVPN におけるセキュリティ機能に関する脆弱性
| Title |
NordVPN におけるセキュリティ機能に関する脆弱性
|
| Summary |
NordVPN には、セキュリティ機能に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
Feb. 28, 2018, midnight |
| Registration Date |
May 28, 2018, 11:50 a.m. |
| Last Update |
May 28, 2018, 11:50 a.m. |
|
CVSS3.0 : 重要
|
| Score |
8.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
9
|
| Vector |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Affected System
| NordVPN.com |
|
NordVPN 3.3.10
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年05月28日] 掲載 |
May 28, 2018, 11:50 a.m. |
NVD Vulnerability Information
CVE-2018-9105
| Summary |
NordVPN 3.3.10 for macOS suffers from a root privilege escalation vulnerability. The vulnerability stems from its privileged helper tool's implemented XPC service. This XPC service is responsible for receiving and processing new OpenVPN connection requests from the main application. Unfortunately this XPC service is not protected, which allows arbitrary applications to connect and send it XPC messages. An attacker can send a crafted XPC message to the privileged helper tool requesting it make a new OpenVPN connection. Because he or she controls the contents of the XPC message, the attacker can specify the location of the openvpn executable, which could point to something malicious they control located on disk. Without validation of the openvpn executable, this will give the attacker code execution in the context of the privileged helper tool.
|
| Publication Date |
March 28, 2018, 8:29 a.m. |
| Registration Date |
March 1, 2021, 7:43 p.m. |
| Last Update |
Nov. 21, 2024, 1:14 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:nordvpn:nordvpn:3.3.10:*:*:*:*:macos:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List