First published: Thu Apr 14 2022(Updated: )
An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to include a UNC path in the OpenVPN configuration file when referencing file paths for parameters (such as auth-user-pass). When this file is imported and the client attempts to validate the file path, it performs an open operation on the path and leaks the user's Net-NTLMv2 hash to an external server. This could be exploited by having a user open a crafted malicious ovpn configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Aws Client Vpn | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25166 is a vulnerability discovered in Amazon AWS VPN Client 2.0.0 that allows for including a UNC path in the OpenVPN configuration file, leading to potential file manipulation.
The severity of CVE-2022-25166 is medium, with a severity value of 5.
CVE-2022-25166 affects Amazon AWS VPN Client 2.0.0, potentially allowing an attacker to include a UNC path in the OpenVPN configuration file and manipulate files.
To fix CVE-2022-25166 in Amazon AWS VPN Client, it is recommended to update to a patched version provided by Amazon.
Additional information about CVE-2022-25166 can be found on the Rhino Security Labs GitHub page and the Rhino Security Labs website.