The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-07-06T12:41:49

Updated: 2024-08-03T04:07:01.433Z

Reserved: 2022-01-31T00:00:00

Link: CVE-2022-24141

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-06T13:15:09.357

Modified: 2024-11-21T06:49:53.560

Link: CVE-2022-24141

cve-icon Redhat

No data.