2 results (0.012 seconds)

CVSS: 7.0EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. • https://github.com/RhinoSecurityLabs/CVEs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file. Se ha detectado un problema en Amazon AWS VPN Client versión 2.0.0. • https://github.com/RhinoSecurityLabs/CVEs https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •