Description
An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
PerFact has released Version 1.6.0, which mitigates this vulnerability.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14160 | An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user. |
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 |
|
History
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:46:31.383Z
Reserved: 2021-02-19T00:00:00.000Z
Link: CVE-2021-27406
Updated: 2024-08-03T20:48:16.965Z
Status : Modified
Published: 2022-10-14T17:15:10.530
Modified: 2024-11-21T05:57:55.933
Link: CVE-2021-27406
No data.
OpenCVE Enrichment
No data.
EUVD