Impact
A local attacker can exploit the unquoted search path used by the Total VPN win-service.exe executable to load a malicious DLL. The vulnerability, classified as an untrusted search path flaw, allows an attacker to execute code with the same privileges as the service, potentially leading to system compromise. The description indicates that exploitation requires significant effort and is difficult, yet the weakness remains present in a running instance of the service.
Affected Systems
Windows systems running Total VPN version 0.5.29.0 are affected. The vulnerability specifically targets the executable located at C:\Program Files\Total VPN\win-service.exe. No other versions or vendors are listed as impacted.
Risk and Exploitability
The CVSS score of 7.3 signals a high severity, but the EPSS score of less than 1% and the absence from the KEV catalog suggest that the likelihood of active exploitation is low. The attack requires local privileges and a high level of complexity, meaning that while the risk is moderate, the opportunity for automated exploitation is limited. Systems should monitor for suspicious DLL loading and consider local mitigation measures.
OpenCVE Enrichment