First published: Mon Aug 02 2021(Updated: )
In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mbconnectline Mbdialup | <=3.9r0.0 |
Update to version 3.9R0.5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-33526.
The severity of CVE-2021-33526 is high with a CVSS score of 7.8.
MB connect line mbDIALUP versions up to and including 3.9R0.0 are affected by CVE-2021-33526.
A low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicious OpenVPN configuration, resulting in arbitrary code execution with the privileges of the service.
It is recommended to update to a version of MB connect line mbDIALUP that is not affected by CVE-2021-33526. Please refer to the vendor's website or contact their support for more information.