CyberGhost 6 for Windows

Privilege Escalation


CyberGhost S.R.L.


CyberGhost 6

Product version

Vulnerability Details

CyberGhost for Windows suffers from a SYSTEM privilege escalation vulnerability through the CG6Service service. This service establishes an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The ConnectToVpnServer method accepts a connectionParams argument that provides attacker control of the OpenVpn command line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user

Vendor response

A release is scheduled

Disclosure timeline

04-17-2018 - Vendor disclosure via email
04-17-2018 - Vendor disclosure via email
04-17-2018 - Vendor notified via Facebook
04-17-2018 - Vendor response: Received
04-18-2018 - Vendor response and followup
04-20-2018 - Vendor response: Something that will be fixed with the next release
05-01-2018 - Vendor notified of the advisory release

Let us build a tailored engagement for you.

We are an international squad of professionals working as one.