CVE-2021-31776
https://notcve.org/view.php?id=CVE-2021-31776
Aviatrix VPN Client before 2.14.14 on Windows has an unquoted search path that enables local privilege escalation to the SYSTEM user, if the machine is misconfigured to allow unprivileged users to write to directories that are supposed to be restricted to administrators. Aviatrix VPN Client versiones anteriores a 2.14.14 en Windows, presenta una ruta de búsqueda sin comillas que habilita una escalada de privilegios local al usuario SYSTEM, si la máquina está configurada inapropiadamente para permitir a usuarios sin privilegios escribir en directorios que se supone que están restringidos a administradores • https://docs.aviatrix.com/Downloads/samlclient.html https://docs.aviatrix.com/Downloads/samlclient.html#windows-win https://docs.aviatrix.com/HowTos/changelog.html#aviatrix-vpn-client-changelog • CWE-428: Unquoted Search Path or Element •
CVE-2020-13417
https://notcve.org/view.php?id=CVE-2020-13417
An Elevation of Privilege issue was discovered in Aviatrix VPN Client before 2.10.7, because of an incomplete fix for CVE-2020-7224. This affects Linux, macOS, and Windows installations for certain OpenSSL parameters. Se detectó un problema de Elevación de Privilegios en Aviatrix VPN Client versiones anteriores a 2.10.7, debido a una corrección incompleta para CVE-2020-7224. Esto afecta las instalaciones de Linux, macOS y Windows para determinados parámetros OpenSSL. • https://docs.aviatrix.com/HowTos/security_bulletin_article.html#openvpn-client-elevation-of-privilege https://www.criticalstart.com/multiple-vulnerabilities-discovered-in-aviatrix •
CVE-2019-17388
https://notcve.org/view.php?id=CVE-2019-17388
Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications. Unos permisos de archivos débiles aplicados al directorio de instalación de Aviatrix VPN Client versiones hasta 2.2.10 sobre Windows y Linux, permiten a un atacante local ejecutar código arbitrario al conseguir privilegios elevados por medio de modificaciones de archivos. • https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability https://immersivelabs.com/blog • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2019-17387
https://notcve.org/view.php?id=CVE-2019-17387
An authentication flaw in the AVPNC_RP service in Aviatrix VPN Client through 2.2.10 allows an attacker to gain elevated privileges through arbitrary code execution on Windows, Linux, and macOS. Un fallo de autenticación en el servicio AVPNC_RP en Aviatrix VPN Client versiones hasta 2.2.10, permite a un atacante conseguir privilegios elevados mediante una ejecución de código arbitrario sobre Windows, Linux y macOS. • https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html https://immersivelabs.com/2019/12/04/aviatrix-vpn-client-vulnerability https://immersivelabs.com/blog •
CVE-2019-6145
https://notcve.org/view.php?id=CVE-2019-6145
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs for finding this vulnerability and for reporting it to us. Forcepoint VPN Client para Windows versiones anteriores a 6.6.1, presenta una vulnerabilidad de ruta de búsqueda sin comillas. • https://help.forcepoint.com/security/CVE/CVE-2019-6145.html https://safebreach.com/Post/Forcepoint-VPN-Client-for-Windows-Unquoted-Search-Path-and-Potential-Abuses-CVE-2019-6145 • CWE-428: Unquoted Search Path or Element •