First published: Wed Jan 02 2019(Updated: )
An issue was discovered in ExpressVPN on Windows. The Xvpnd.exe process (which runs as a service with SYSTEM privileges) listens on TCP port 2015, which is used as an RPC interface for communication with the client side of the ExpressVPN application. A JSON-RPC protocol over HTTP is used for communication. The JSON-RPC XVPN.GetPreference and XVPN.SetPreference methods are vulnerable to path traversal, and allow reading and writing files on the file system on behalf of the service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ExpressVPN ExpressVPN | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15490 is a vulnerability in ExpressVPN on Windows that allows local privilege escalation.
The severity of CVE-2018-15490 is high, with a severity value of 7.1.
CVE-2018-15490 allows an attacker to escalate their privileges by exploiting the Xvpnd.exe process in ExpressVPN on Windows.
No, Microsoft Windows is not affected by CVE-2018-15490.
To fix CVE-2018-15490, update to the latest version of ExpressVPN on Windows.