An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-29909 An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T04:36:05.828Z

Reserved: 2022-02-15T00:00:00

Link: CVE-2022-25166

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-14T16:15:08.763

Modified: 2024-11-21T06:51:44.153

Link: CVE-2022-25166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses