ProtonVPN における認可・権限・アクセス制御に関する脆弱性
| Title |
ProtonVPN における認可・権限・アクセス制御に関する脆弱性
|
| Summary |
ProtonVPN には、認可・権限・アクセス制御に関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
March 23, 2018, midnight |
| Registration Date |
June 19, 2018, 5:43 p.m. |
| Last Update |
June 19, 2018, 5:43 p.m. |
|
CVSS3.0 : 緊急
|
| Score |
9.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
10
|
| Vector |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
Affected System
| ProtonVPN |
|
ProtonVPN 1.3.3
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月19日] 掲載 |
June 19, 2018, 5:43 p.m. |
NVD Vulnerability Information
CVE-2018-10169
| Summary |
ProtonVPN 1.3.3 for Windows suffers from a SYSTEM privilege escalation vulnerability through the "ProtonVPN Service" service. This service establishes an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The "Connect" method accepts a class instance argument that provides attacker control of the OpenVPN command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection. This plugin will execute code in the context of the SYSTEM user.
|
| Publication Date |
April 17, 2018, 6:29 a.m. |
| Registration Date |
March 1, 2021, 6:41 p.m. |
| Last Update |
Nov. 21, 2024, 12:40 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:protonmail:protonvpn:1.3.3:*:*:*:*:windows:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List