SB2018051418 - Privilege escalation in ProtonVPN



SB2018051418 - Privilege escalation in ProtonVPN

Published: May 14, 2018

Security Bulletin ID SB2018051418
CSH Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 vulnerability.


1) Privilege escalation (CVE-ID: CVE-2018-10169)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the "ProtonVPN Service" service due to establishing an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods and in the "Connect" method due to accepting a class instance argument. A local attacker can take control of the OpenVPN command line, specify a dynamic library plugin that should run for every new VPN connection and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.