SaferVPN for Windows

Privilege Escalation


Safer Social Ltd



Product Version


Vulnerability Details

SaferVPN for Windows suffers from a SYSTEM privilege escalation vulnerability in its SaferVPN.Service service. The SaferVPN.Service service executes openvpn.exe using OpenVPN config files located within the current user’s local application data directory i.e. AppDataLocalSaferVPNOvpnConfig. An authenticated attacker may modify these configuration files to specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user.

Vendor Response

A release is scheduled

Disclosure Timeline

  • Vendor disclosure via email

  • Vendor notified via Facebook

  • Vendor response via email: Reviewing

  • Vendor followup

  • Vendor response: A release is scheduled that resolves this issue

  • Vendor notified of the advisory release