Vulnerability Description
SaferVPN 4.2.5 for Windows suffers from a SYSTEM privilege escalation vulnerability in its "SaferVPN.Service" service. The "SaferVPN.Service" service executes "openvpn.exe" using OpenVPN config files located within the current user's %LOCALAPPDATA%\SaferVPN\OvpnConfig directory. An authenticated attacker may modify these configuration files to specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Safervpn | Safervpn | 4.2.5 |
Related Weaknesses (CWE)
References
- https://github.com/VerSprite/research/blob/master/advisories/VS-2018-024.mdThird Party Advisory
- https://github.com/VerSprite/research/blob/master/advisories/VS-2018-024.mdThird Party Advisory
FAQ
What is CVE-2018-10647?
CVE-2018-10647 is a vulnerability with a CVSS score of 7.8 (HIGH). SaferVPN 4.2.5 for Windows suffers from a SYSTEM privilege escalation vulnerability in its "SaferVPN.Service" service. The "SaferVPN.Service" service executes "openvpn.exe" using OpenVPN config files ...
How severe is CVE-2018-10647?
CVE-2018-10647 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10647?
Check the references section above for vendor advisories and patch information. Affected products include: Safervpn Safervpn.