An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
Solution:
One or more system settings or configuration elements can be externally controlled by a user.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 | third party advisory us government resource |