Vulnerability Description
An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perfact | Openvpn-Client | <= 1.4.1.0 |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01Third Party AdvisoryUS Government Resource
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-27406?
CVE-2021-27406 is a vulnerability with a CVSS score of 8.8 (HIGH). An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into i...
How severe is CVE-2021-27406?
CVE-2021-27406 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-27406?
Check the references section above for vendor advisories and patch information. Affected products include: Perfact Openvpn-Client.