← Volver a CVEs
CVE-2022-25166
MEDIUM5.0
Descripcion
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Detalles CVE
Puntuacion CVSS v3.15.0
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioREQUIRED
Publicado4/14/2022
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
amazon:aws_client_vpn
Debilidades (CWE)
CWE-200
Referencias
https://github.com/RhinoSecurityLabs/CVEs(cve@mitre.org)
https://github.com/RhinoSecurityLabs/CVEs(af854a3a-2127-422b-91ae-364da2661108)
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.