Microsoft Uncovers Four OpenVPN Weaknesses Leading to Possible RCE and LPE

Aug 09, 2024Ravie LakshmananVulnerability / Network Security

Four medium-severity security vulnerabilities in the open-source OpenVPN software were disclosed by Microsoft on Thursday.

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

Aug 09, 2024Ravie LakshmananVulnerability / Network Security

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

Four medium-severity security vulnerabilities in the open-source OpenVPN software were disclosed by Microsoft on Thursday. These vulnerabilities have the potential to enable the exploitation of remote code execution (RCE) and local privilege escalation (LPE).

“This series of attacks could grant attackers complete control over specific endpoints, potentially leading to data breaches, system compromises, and unauthorized access to confidential information,” mentioned Vladimir Tokarev from the Microsoft Threat Intelligence Community stated.

The exploitation showcased at Black Hat USA 2024 necessitates user authentication and a profound comprehension of OpenVPN’s internal processes. These vulnerabilities impact all versions of OpenVPN predating version 2.6.10 and 2.5.10.


Cybersecurity

The vulnerability list includes –

  • CVE-2024-27459 – A Windows stack overflow vulnerability leading to a Denial-of-Service (DoS) situation and LPE
  • CVE-2024-24974 – Unauthorized access to the “openvpnservice” named pipe in Windows, enabling a remote attacker to interact with it and initiate operations on it
  • CVE-2024-27903 – A plugin mechanism weakness leading to RCE in Windows, and LPE and data interference in Android, iOS, macOS, and BSD
  • CVE-2024-1305 – A Windows memory overflow vulnerability resulting in a DoS scenario

The initial three flaws are linked to a component known as openvpnserv, while the last resides in the Windows Terminal Access Point (TAP) driver.

OpenVPN

Once an attacker obtains a user’s OpenVPN credentials, which can be acquired through various means such as purchasing stolen credentials on the dark web, utilizing stealer malware, or sniffing network traffic to capture NTLMv2 hashes and then decoding them using tools like HashCat or John the Ripper, all vulnerabilities become exploitable.

An attacker could combine different vulnerabilities in multiple ways — CVE-2024-24974 and CVE-2024-27903 or CVE-2024-27459 and CVE-2024-27903 — to achieve RCE and LPE, respectively.


Cybersecurity


“At least three of the four identified vulnerabilities could be utilized by an attacker to create exploits for RCE and LPE, which could then be interconnected into a potent attack sequence,” Tokarev mentioned, indicating that they could leverage strategies like Bring Your Own Vulnerable Driver (BYOVD) after achieving LPE.

“By employing these methodologies, the attacker can, for example, circumvent Protect Process Light (PPL) for critical processes like Microsoft Defender or circumvent and tamper with other essential processes within the system. Such actions empower attackers to bypass security solutions, manipulate fundamental system functions, solidify their control, and evade detection,” he added.

Found this article intriguing? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.