An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14160 | An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user. |
Fixes
Solution
PerFact has released Version 1.6.0, which mitigates this vulnerability.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 |
|
History
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:46:31.383Z
Reserved: 2021-02-19T00:00:00.000Z
Link: CVE-2021-27406
Updated: 2024-08-03T20:48:16.965Z
Status : Modified
Published: 2022-10-14T17:15:10.530
Modified: 2024-11-21T05:57:55.933
Link: CVE-2021-27406
No data.
OpenCVE Enrichment
No data.
EUVD