An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
References
Link | Resource |
---|---|
https://github.com/RhinoSecurityLabs/CVEs | Exploit Third Party Advisory |
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-14T15:18:53
Updated: 2022-04-14T15:18:53
Reserved: 2022-02-15T00:00:00
Link: CVE-2022-25166
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-14T16:15:08.763
Modified: 2022-04-23T02:35:09.957
Link: CVE-2022-25166
JSON object: View
Redhat Information
No data.
CWE