NordVPN for Windows | Security Research Advisory | VerSprite NordVPN for Windows | Security Research Advisory | VerSprite

Home  |  Research  |  Resources  |  Advisories  |  NordVPN for Windows

NordVPN for Windows

Privilege Escalation






NordVPN for Windows

Product version

Vulnerability Details

NordVPN for Windows suffers from a SYSTEM privilege escalation vulnerability through the nordvpn-service service. This service establishes an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The Connect method accepts a class instance argument that provides attacker control of the OpenVpncommand line. An attacker can specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user.

Vendor response

The vendor will review and update

Disclosure timeline

03-21-2018 - Vendor disclosure via email
03-21-2018 - Vendor response
03-21-2018 - Vendor response via email
04-16-2018 - Vendor notified of the advisory release

Offensive Minded Security Exploit Development

We are an international squad of professionals working as one.