Vulnerability Details : CVE-2022-25165
An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.
Vulnerability category: Gain privilegeDenial of service
Products affected by CVE-2022-25165
- cpe:2.3:a:amazon:aws_client_vpn:2.0.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-25165
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 15 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-25165
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2022-25165
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-25165
-
https://github.com/RhinoSecurityLabs/CVEs
GitHub - RhinoSecurityLabs/CVEs: A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.Exploit;Third Party Advisory
-
https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
CVE-2022-25165: Privilege Escalation to SYSTEM in AWS VPN Client - Rhino Security LabsExploit;Third Party Advisory
Jump to