CVE-2025-26155

9.8 CRITICAL

📋 TL;DR

This CVE describes an Untrusted Search Path vulnerability in NCP VPN clients that allows attackers to execute arbitrary code by placing malicious DLLs in directories searched by the application. It affects users of NCP Secure Enterprise Client 13.18 and NCP Secure Entry Windows Client 13.19 on Windows systems.

💻 Affected Systems

Products:
  • NCP Secure Enterprise Client
  • NCP Secure Entry Windows Client
Versions: 13.18 for Enterprise Client, 13.19 for Entry Client
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of these VPN clients. Requires local access to place malicious DLLs in search paths.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing complete control over the affected machine, data theft, and lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to administrative access on the compromised system, enabling further attacks and persistence.

🟢

If Mitigated

Limited impact if proper application whitelisting and path restrictions are enforced, preventing unauthorized DLL loading.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring access to the target system.
🏢 Internal Only: HIGH - Attackers with initial access to a workstation can escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the target system. Attackers need to place a malicious DLL in a directory that the application searches before legitimate system directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for latest patched versions

Vendor Advisory: https://www.ncp-e.com/

Restart Required: Yes

Instructions:

1. Visit NCP vendor website for latest security updates. 2. Download and install the patched version. 3. Restart the system to ensure changes take effect. 4. Verify the installation was successful.

🔧 Temporary Workarounds

Restrict DLL Search Path

windows

Configure Windows to restrict DLL search paths and prevent loading from untrusted directories

Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "SafeDllSearchMode" -Value 1
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager" -Name "CWDIllegalInDllSearch" -Value 1

Application Whitelisting

windows

Implement application control policies to prevent execution of unauthorized DLLs

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent users from writing to application directories
  • Use endpoint detection and response (EDR) tools to monitor for DLL hijacking attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version of NCP client via Control Panel > Programs and Features or using PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*NCP*"} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*NCP*"} | Select-Object Name, Version

Verify Fix Applied:

Verify installed version is newer than affected versions and check vendor advisory for specific patched version numbers

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual paths
  • Application errors related to missing or corrupted DLLs
  • Process creation events for NCP clients with suspicious parent processes

Network Indicators:

  • Unusual outbound connections from NCP client processes
  • VPN connection attempts from compromised accounts

SIEM Query:

EventID=4688 AND (NewProcessName LIKE "%ncp%" OR NewProcessName LIKE "%NCP%") AND (CommandLine CONTAINS "dll" OR ParentProcessName NOT IN ("explorer.exe", "services.exe"))

🔗 References

📤 Share & Export