← Back to CVEs
CVE-2022-25166
MEDIUM5.0
Description
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
CVE Details
CVSS v3.1 Score5.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionREQUIRED
Published4/14/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
amazon:aws_client_vpn
Weaknesses (CWE)
CWE-200
References
https://github.com/RhinoSecurityLabs/CVEs(cve@mitre.org)
https://github.com/RhinoSecurityLabs/CVEs(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.