An attacker can take leverage on PerFact OpenVPN-Client versions 1.4.1.0 and prior to send the config command from any application running on the local host machine to force the back-end server into initializing a new open-VPN instance with arbitrary open-VPN configuration. This could result in the attacker achieving execution with privileges of a SYSTEM user.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-056-01 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-03T20:48:16.965Z
Reserved: 2021-02-19T00:00:00
Link: CVE-2021-27406

No data.

Status : Modified
Published: 2022-10-14T17:15:10.530
Modified: 2024-11-21T05:57:55.933
Link: CVE-2021-27406

No data.