The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().
References
Link Resource
http://iobit.com Vendor Advisory
http://itop.com Not Applicable
https://github.com/tomerpeled92/CVE/ Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-07-06T12:41:49

Updated: 2022-07-06T12:41:49

Reserved: 2022-01-31T00:00:00


Link: CVE-2022-24141

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-07-06T13:15:09.357

Modified: 2022-07-14T01:50:52.880


Link: CVE-2022-24141

JSON object: View

cve-icon Redhat Information

No data.