CVE-2018-10381

9.8 CRITICAL

📋 TL;DR

TunnelBear 3.2.0.6 for Windows has a privilege escalation vulnerability where the TunnelBearMaintenance service exposes a NetNamedPipe endpoint. Any local application can connect to this endpoint and use the OpenVPNConnect method to execute arbitrary code as SYSTEM by specifying a malicious OpenVPN plugin. This affects all Windows users running the vulnerable version.

💻 Affected Systems

Products:
  • TunnelBear VPN Client
Versions: 3.2.0.6 for Windows
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows version. The TunnelBearMaintenance service runs with SYSTEM privileges by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent malware, steal credentials, disable security controls, and pivot to other systems.

🟠

Likely Case

Local attackers or malware gaining SYSTEM privileges to bypass security software, install backdoors, or access protected system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced, though SYSTEM access would still be possible.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any local user or malware can exploit this to gain SYSTEM privileges on affected workstations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but no authentication. Public proof-of-concept code exists in the advisory references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.2.0.6

Vendor Advisory: https://www.tunnelbear.com/blog/tunnelbear-security-update/

Restart Required: Yes

Instructions:

1. Open TunnelBear application. 2. Check for updates in settings. 3. Install latest version. 4. Restart computer to ensure service updates apply.

🔧 Temporary Workarounds

Disable TunnelBearMaintenance Service

windows

Stop and disable the vulnerable service to prevent exploitation.

sc stop TunnelBearMaintenance
sc config TunnelBearMaintenance start= disabled

Remove Named Pipe Access

windows

Restrict access to the vulnerable named pipe endpoint.

icacls \\.\pipe\TunnelBearMaintenance /deny Everyone:(F)

🧯 If You Can't Patch

  • Uninstall TunnelBear 3.2.0.6 and use alternative VPN software
  • Implement strict application control policies to prevent unauthorized local code execution

🔍 How to Verify

Check if Vulnerable:

Check if TunnelBearMaintenance service exists and is running, and verify TunnelBear version is 3.2.0.6.

Check Version:

Check TunnelBear 'About' section in application or examine installed programs in Control Panel

Verify Fix Applied:

Verify TunnelBear version is newer than 3.2.0.6 and check that named pipe \\.\pipe\TunnelBearMaintenance is no longer accessible or service is removed.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected SYSTEM privilege processes spawned from TunnelBearMaintenance
  • Security logs showing named pipe connections to TunnelBearMaintenance

Network Indicators:

  • Local named pipe connections to \\.\pipe\TunnelBearMaintenance from non-TunnelBear processes

SIEM Query:

Process Creation where Parent Process Name contains 'TunnelBear' AND Integrity Level = 'System'

🔗 References

📤 Share & Export