SB2018051418 - Privilege escalation in ProtonVPN
Published: May 14, 2018
Security Bulletin ID
SB2018051418
CSH Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 vulnerability.
1) Privilege escalation (CVE-ID: CVE-2018-10169)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists in the "ProtonVPN Service" service due to establishing an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods and in the "Connect" method due to accepting a class instance argument. A local attacker can take control of the OpenVPN command line, specify a dynamic library plugin that should run for every new VPN connection and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.