Vulnerability Description
An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP is used for communication. The JSON-RPC XVPN.GetPreference and XVPN.SetPreference methods are vulnerable to path traversal, and allow reading and writing files on the file system on behalf of the service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Expressvpn | Expressvpn | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-loc
- https://medium.com/%40Wflki/https-medium-com-wflki-cve-2018-15490-expressvpn-loc
FAQ
What is CVE-2018-15490?
CVE-2018-15490 is a vulnerability with a CVSS score of 7.1 (HIGH). An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication w...
How severe is CVE-2018-15490?
CVE-2018-15490 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-15490?
Check the references section above for vendor advisories and patch information. Affected products include: Expressvpn Expressvpn, Microsoft Windows.