← Voltar para CVEs
CVE-2022-25166
MEDIUM5.0
Descricao
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Detalhes CVE
Pontuacao CVSS v3.15.0
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Vetor de ataqueLOCAL
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioREQUIRED
Publicado4/14/2022
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
amazon:aws_client_vpn
Fraquezas (CWE)
CWE-200
Referencias
https://github.com/RhinoSecurityLabs/CVEs(cve@mitre.org)
https://github.com/RhinoSecurityLabs/CVEs(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.