Description
Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.
Published: 2021-06-28
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-22159 Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.
History

No history.

Subscriptions

Securepoint Openvpn-client
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T00:40:47.226Z

Reserved: 2021-06-28T00:00:00.000Z

Link: CVE-2021-35523

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-28T17:15:08.083

Modified: 2024-11-21T06:12:26.400

Link: CVE-2021-35523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses