CVE ID<\/strong><\/gwmw><\/td> | OpenVPN component<\/strong><\/td> | Impact<\/strong><\/td> | Affected platform<\/strong><\/td><\/tr> |
CVE-2024-27459<\/a><\/td> | openvpnserv <\/td> | Denial of service (DoS), local privilege escalation (LPE)<\/td> | Windows<\/td><\/tr> |
CVE-2024-24974<\/a><\/td> | openvpnserv <\/td> | Unauthorized access <\/td> | Windows<\/td><\/tr> |
CVE-2024-27903<\/a><\/td> | openvpnserv<\/td> | Remote code execution (RCE)<\/td> | Windows<\/td><\/tr> |
Local privilege escalation (LPE), data manipulation<\/td> | Android, iOS, macOS, BSD<\/td><\/tr> |
CVE-2024-1305<\/a><\/td> | Windows TAP driver <\/td> | Denial of service (DoS) <\/td> | Windows<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n <\/gwmw>An attack can exploit these vulnerabilities after obtaining a user’s credentials through differed methods, such as purchasing them on the dark web<\/a>, using an info stealer, or capturing NTLMv2 hashes from network traffic and cracking them with tools like HashCat or John the Ripper. <\/p>\n\n\n\n “As our research demonstrated, an attacker could leverage at least three of the four discovered vulnerabilities to create exploits to achieve RCE and LPE, which could then be chained together to create a powerful attack chain.” concludes the post. “Through these techniques, the attacker can, for instance, disable Protect Process Light (PPL) for a critical process such as Microsoft Defender or bypass and meddle with other critical processes in the system. These actions enable attackers to bypass security products and manipulate the system\u2019s core functions, further entrenching their control and avoiding detection.”<\/em><\/p>\n\n\n\n Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n (<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, RCE)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":" Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). OpenVPN is an […]<\/p>\n","protected":false},"author":1,"featured_media":166919,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,5,55],"tags":[4112,9508,9506,10918,2368,687,841,1533],"class_list":["post-166912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-hacking","category-security","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-openvpn","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司 |