Add to favourites
News Local and Global in your language
21st of October 2018

Internet



Security Holes Discovered in 2 Popular VPN Services - ExtremeTech

This site may earn affiliate commissions from the links on this page. Terms of use. 449808-generic-security-hacking

VPN services work by passing traffic through an encrypted tunnel, which providers say can help preserve your privacy and security online. However, two of the most popular VPNs were, at least for a time, exposing users to a serious security flaw could let attackers run arbitrary code on an affected computer.

According to a post from Cisco Talos security researchers, both NordVPN and ProtonVPN suffered from vulnerabilities in the way their desktop clients accessed VPN services. The bugs, known as CVE-2018-3952 and CVE-2018-4010, opened the door to so-called privilege escalation attack. The attacker could, in theory, run any code they wanted as a regular user with administrator privileges.

The vulnerabilities might never have been discovered if not for a separate exploit that both providers patched several months ago. Following the CVE-2018-10169 in April, security researchers from Talos started looking for similar exploits. They found it was still possible to force the NordVPN and ProtonVPN clients to run arbitrary code via the newly detailed methods.

According to Talos, the Windows clients for both VPN services execute OpenVPN binaries per the permission of a logged-in user. For example, you could use the NordVPN or ProtonVPN client to activate a VPN connection with a server in a particular location. The client executed the necessary binary on your system to make the connection. The original CVE-2018-10169 allowed attackers to substitute a malicious OpenVPN file that could hijack a connection.

Both services deployed a fix for CVE-2018-10169 in April, but Talos discovered a coding mistake in the patch. As a result, it was still possible to run arbitrary code when the user clicked “connect.” For both exploits, the attacker needed to have access to the victim’s PC prior to exploiting the VPN services. Talos alerted both VPN providers earlier this year and withheld disclosure until new patches were pushed out to users.

A Talos demo using the bug to launch Notepad when the VPN connects.

ProtonVPN solved the problem by moving the OpenVPN configuration files into the installation directory where non-administrator users can’t modify them. NordVPN implemented an XML model to generate OpenVPN configuration files, and non-administrator users cannot edit the XML template.

If you use either of these VPN services, make sure you update your client to the latest build. Both NordVPN and ProtonVPN are keen to point out there is no evidence of the vulnerabilities being exploited in the wild. Still, better safe than sorry.

Update: NordVPN has reached out to offer a full statement on the flaw. The upcoming security audit appears to be a new detail since the story first broke.

The vulnerability had already been fixed by the time Cisco publicly disclosed the CVE. At the beginning of August, an automatic update was pushed to all our customers, which means the majority of users had their apps updated long before the public disclosure. These actions virtually eliminated any risk of the vulnerability being exploited in real life conditions.

It is also worth mentioning, that in order to exploit the flaw, an attacker had to have physical access to a victim’s PC. Such a situation alone leads to a variety of severe security threats beyond any individual apps.

In order to apply the best security practices, we are also running an independent application security audit.

Now read: Facebook’s Free VPN App Pulled from Apple App Store for Privacy Violations, Pornhub Launches Free VPN That’s Totally Not Exclusively for Porn, and Protect Your Online Privacy With the 5 Best VPNs.

Read More




Leave A Comment

More News

Latest ITProPortal news

ExtremeTech » Internet

TechRadar: Internet news

TechCrunch » Enterprise

How-To Geek

Digital Trends

Disclaimer and Notice:WorldProNews.com is not the owner of these news or any information published on this site.