An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.
References
Link | Resource |
---|---|
https://github.com/RhinoSecurityLabs/CVEs | Exploit Third Party Advisory |
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ | Exploit Third Party Advisory |
https://github.com/RhinoSecurityLabs/CVEs | Exploit Third Party Advisory |
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RhinoSecurityLabs/CVEs - Exploit, Third Party Advisory | |
References | () https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ - Exploit, Third Party Advisory |
Information
Published : 2022-04-14 16:15
Updated : 2024-11-21 06:51
NVD link : CVE-2022-25165
Mitre link : CVE-2022-25165
CVE.ORG link : CVE-2022-25165
JSON object : View
Products Affected
amazon
- aws_client_vpn
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition