ProtonVPN for Windows | Security Research Advisory | VerSprite ProtonVPN for Windows | Security Research Advisory | VerSprite

Home  |  Research  |  Resources  |  Advisories  |  ProtonVPN for Windows

ProtonVPN for Windows

Privilege Escalation

CVE ID

CVE-2018-10169

VENDOR

ProtonVPN AG

PRODUCT

ProtonVPN

Product version

1.3.3

Vulnerability Details

ProtonVPN for Windows suffers from a SYSTEM privilege escalation vulnerability through the ProtonVPN Service. This service establishes an NetNamedPipe endpoint that allows arbitrary installed applications to connect and call publicly exposed methods. The Connect method accepts a class instance argument that provides attacker control of the OpenVpncommand line. An attacker can specify a dynamic library plugin that should run for every new VPN connection. This plugin will execute code in the context of the SYSTEM user.

Learn More →

Vendor response

Vendor development team will release update

Disclosure timeline

03-23-2018 - Vendor disclosure via email
03-23-2018 - Vendor notified via Facebook
03-26-2018 - Vendor response via email
03-28-2018 - VerSprite Security extends advisory release timeline
04-16-2018 - Vendor notified of the advisory release

Offensive Minded Security Exploit Development

We are an international squad of professionals working as one.

logos