Bitmask Riseup VPN 0.21.6 contains a local privilege escalation flaw due to improper access controls. When the software is installed with a non-default installation directory off of the system root, the installer fails to properly set ACLs. This allows lower privileged users to replace the VPN executable with a malicious one. When a higher privileged user such as an Administrator launches that executable, it is possible for the lower privileged user to escalate to Administrator privileges.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2021-58 | Patch Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-58 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2021-58 - Patch, Third Party Advisory |
Information
Published : 2021-12-30 22:15
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44466
Mitre link : CVE-2021-44466
CVE.ORG link : CVE-2021-44466
JSON object : View
Products Affected
leap
- bitmask_riseup_vpn
microsoft
- windows
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource