Vulnerability Description
A vulnerability has been found in IVPN Client 2.6.6120.33863 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument --up cmd leads to improper privilege management. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.6.2 is able to address this issue. It is recommended to upgrade the affected component.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ivpn | Ivpn | 2.6.6120.33863 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Feb/14Mailing ListThird Party Advisory
- https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalatExploitThird Party Advisory
- https://vuldb.com/?id.96655Permissions RequiredThird Party Advisory
- http://seclists.org/fulldisclosure/2017/Feb/14Mailing ListThird Party Advisory
- https://github.com/kacperszurek/exploits/blob/master/IVPN/ivpn_privilege_escalatExploitThird Party Advisory
- https://vuldb.com/?id.96655Permissions RequiredThird Party Advisory
FAQ
What is CVE-2017-20112?
CVE-2017-20112 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability has been found in IVPN Client 2.6.6120.33863 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument --up cmd leads to ...
How severe is CVE-2017-20112?
CVE-2017-20112 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-20112?
Check the references section above for vendor advisories and patch information. Affected products include: Ivpn Ivpn.