CVE-2021-35523
📋 TL;DR
This vulnerability allows local unprivileged users on Windows systems to escalate privileges to SYSTEM level by modifying OpenVPN configuration files. It affects Securepoint SSL VPN Client v2 installations where non-admin users can write to the application's configuration directory. Attackers can add malicious scripts that execute with elevated privileges.
💻 Affected Systems
- Securepoint SSL VPN Client v2
📦 What is this software?
Openvpn Client by Securepoint
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full SYSTEM privileges, enabling complete system compromise, credential theft, persistence establishment, and lateral movement capabilities.
Likely Case
Malicious insider or compromised user account escalates to SYSTEM to install malware, steal sensitive data, or disable security controls.
If Mitigated
With proper access controls and patching, impact is limited to failed privilege escalation attempts that can be detected and logged.
🎯 Exploit Status
Exploit requires local user access but no special privileges. Multiple public proof-of-concept exploits exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.32 or later
Vendor Advisory: https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34
Restart Required: Yes
Instructions:
1. Download Securepoint SSL VPN Client v2.0.32 or later from official sources. 2. Uninstall previous version. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict configuration directory permissions
windowsSet restrictive ACLs on the Securepoint SSL VPN configuration directory to prevent non-admin users from modifying files.
icacls "%APPDATA%\Securepoint SSL VPN" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(W)"
Disable script execution in OpenVPN config
allModify OpenVPN configuration to disable script execution or validate script paths.
Add 'script-security 0' to OpenVPN configuration files to disable script execution
🧯 If You Can't Patch
- Remove write permissions for non-admin users on %APPDATA%\Securepoint SSL VPN directory
- Monitor for unauthorized modifications to OpenVPN configuration files and script execution events
🔍 How to Verify
Check if Vulnerable:
Check if Securepoint SSL VPN Client version is below 2.0.32 and verify non-admin users have write access to %APPDATA%\Securepoint SSL VPN directory.
Check Version:
Check program version in Control Panel > Programs and Features or run the VPN client and check About section.
Verify Fix Applied:
Verify installed version is 2.0.32 or higher and test that non-admin users cannot modify files in the configuration directory.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file modifications in %APPDATA%\Securepoint SSL VPN directory
- Execution of unexpected scripts by SYSTEM account
- OpenVPN configuration changes from non-admin users
Network Indicators:
- Unusual outbound connections from SYSTEM context following VPN client activity
SIEM Query:
EventID=4688 AND NewProcessName LIKE '%script%' AND SubjectUserName='SYSTEM' AND ParentProcessName LIKE '%openvpn%'
🔗 References
- http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2021/Jun/59
- https://bogner.sh/2021/04/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
- https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34
- http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2021/Jun/59
- https://bogner.sh/2021/04/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30/
- https://github.com/Securepoint/openvpn-client/security/advisories/GHSA-v8p8-4w8f-qh34