VyprVPN for Windows

Privilege Escalation


Golden Frog



Product Version

Vulnerability Details

VyprVPN for Windows suffers from a SYSTEM privilege escalation vulnerability through the VyprVPN service. This service establishes an NetNamedPipe endpoint that allows applications to connect and call publicly exposed methods. The SetProperty method allows an attacker to configure the AdditionalOpenVpnParameters property and control the OpenVpn command line. Using the OpenVPN plugin parameter, an attacker may specify a dynamic library plugin that should run for every new VPN connection attempt. This plugin will execute code in the context of the SYSTEM user. This attack may be conducted using VyprVPN Free account credentials and the VyprVPN Desktop Client.

Vendor Response

A release is scheduled

Disclosure Timeline

  • Vendor disclosure via email

  • Vendor notified via Facebook

  • Vendor response via email: Vulnerability resolved in latest release

  • VerSprite verifies vulnerability unresolved

  • VerSprite notifies the vendor of findings

  • Vendor followup

  • Vendor response: A release is scheduled that resolves this vulnerability

  • Vendor notified of the advisory release