Vulnerability Description
Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Securepoint | Openvpn-Client | >= 2.0.15, < 2.0.32 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-LoExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2021/Jun/59Mailing ListThird Party Advisory
- https://bogner.sh/2021/04/local-privilege-escalation-in-securepoint-ssl-vpn-clieExploitThird Party Advisory
- https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8fThird Party Advisory
- http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-LoExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2021/Jun/59Mailing ListThird Party Advisory
- https://bogner.sh/2021/04/local-privilege-escalation-in-securepoint-ssl-vpn-clieExploitThird Party Advisory
- https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8fThird Party Advisory
FAQ
What is CVE-2021-35523?
CVE-2021-35523 is a vulnerability with a CVSS score of 7.8 (HIGH). Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the Open...
How severe is CVE-2021-35523?
CVE-2021-35523 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-35523?
Check the references section above for vendor advisories and patch information. Affected products include: Securepoint Openvpn-Client.