CVE-2021-44466

7.3 HIGH

📋 TL;DR

CVE-2021-44466 is a local privilege escalation vulnerability in Bitmask Riseup VPN 0.21.6. When installed in a non-default directory, improper ACLs allow low-privileged users to replace the VPN executable with malicious code. When an administrator runs the compromised executable, the attacker gains administrator privileges.

💻 Affected Systems

Products:
  • Bitmask Riseup VPN
Versions: 0.21.6
Operating Systems: Windows, Linux
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when installed in non-default directory off system root. Default installation is not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrator/root privileges, enabling installation of persistent malware, data theft, and lateral movement.

🟠

Likely Case

Local attacker escalates privileges to administrator level, gaining full control over the affected system.

🟢

If Mitigated

No privilege escalation possible if proper ACLs are set or software is installed in default location.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Malicious insider or compromised low-privileged account can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to installation directory. Attack is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.21.7 and later

Vendor Advisory: https://0xacab.org/leap/bitmask-vpn/-/issues/10749

Restart Required: Yes

Instructions:

1. Download latest version from official Riseup VPN website. 2. Uninstall vulnerable version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Set Proper ACLs on Installation Directory

all

Manually set restrictive permissions on the VPN installation directory to prevent unauthorized writes.

Windows: icacls "C:\Path\To\RiseupVPN" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
Linux: chmod 755 /path/to/riseupvpn && chown root:root /path/to/riseupvpn/*

Reinstall in Default Location

all

Uninstall from non-default directory and reinstall in default system location where proper ACLs are automatically set.

🧯 If You Can't Patch

  • Remove Riseup VPN from all systems where it's installed in non-default directories
  • Implement strict access controls and monitoring on systems with vulnerable installations

🔍 How to Verify

Check if Vulnerable:

Check if Riseup VPN version is 0.21.6 AND installed in non-default directory. Verify ACLs on installation directory allow write access to non-admin users.

Check Version:

Windows: Check program files or registry. Linux: riseup-vpn --version or check package manager.

Verify Fix Applied:

Confirm version is 0.21.7 or later AND installation directory has proper ACLs restricting write access to administrators only.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file modifications in Riseup VPN installation directory
  • Process execution of Riseup VPN from non-standard locations
  • Privilege escalation events following VPN execution

Network Indicators:

  • Unusual outbound connections following VPN client execution

SIEM Query:

Process creation where parent process is RiseupVPN.exe AND child process has elevated privileges

🔗 References

📤 Share & Export