First published: Wed Jul 06 2022(Updated: )
The iTopVPNmini.exe component of iTop VPN 3.2 will try to connect to datastate_iTopVPN_Pipe_Server on a loop. An attacker that opened a named pipe with the same name can use it to gain the token of another user by listening for connections and abusing ImpersonateNamedPipeClient().
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Iobit Itop Vpn | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-24141.
The severity of CVE-2022-24141 is medium with a CVSS score of 5.4.
The affected software is iTop VPN version 3.2.
An attacker can exploit CVE-2022-24141 by opening a named pipe with the same name as datastate_iTopVPN_Pipe_Server and listening for connections to gain the token of another user.
Yes, there are references available for CVE-2022-24141. You can find them at the following URLs: [http://iobit.com](http://iobit.com), [http://itop.com](http://itop.com), [https://github.com/tomerpeled92/CVE/](https://github.com/tomerpeled92/CVE/)