// For flags

CVE-2022-24141

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().

El componente iTopVPNmini.exe de iTop VPN versión 3.2, intentará conectarse a datastate_iTopVPN_Pipe_Server en un bucle. Un atacante que abriera una tubería con nombre con el mismo nombre puede usarla para obtener el token de otro usuario escuchando conexiones y abusando de la función ImpersonateNamedPipeClient()

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-31 CVE Reserved
  • 2022-07-06 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (3)
URL Tag Source
http://itop.com Not Applicable
https://github.com/tomerpeled92/CVE Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
http://iobit.com 2022-07-14
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Iobit
Search vendor "Iobit"
Itop Vpn
Search vendor "Iobit" for product "Itop Vpn"
3.2
Search vendor "Iobit" for product "Itop Vpn" and version "3.2"
-
Affected