← Retour aux CVEs
CVE-2022-25166
MEDIUM5.0
Description
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Details CVE
Score CVSS v3.15.0
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie4/14/2022
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
amazon:aws_client_vpn
Faiblesses (CWE)
CWE-200
References
https://github.com/RhinoSecurityLabs/CVEs(cve@mitre.org)
https://github.com/RhinoSecurityLabs/CVEs(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.