CVE-2025-65199

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Windscribe VPN for Linux allows users in the windscribe group to execute arbitrary commands as root via command injection in the changeMTU function. This affects Linux desktop installations where users have been added to the windscribe group. The vulnerability enables complete system compromise from a limited local user account.

💻 Affected Systems

Products:
  • Windscribe VPN Desktop App
Versions: All versions before v2.18.3-alpha and v2.18.8
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where users have been added to the windscribe group, which is required for VPN functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover by any local user in windscribe group, allowing installation of persistent backdoors, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation to root by malicious or compromised user accounts, enabling privilege abuse, credential harvesting, and persistence establishment.

🟢

If Mitigated

Limited impact if proper access controls restrict windscribe group membership and network segmentation limits lateral movement.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring existing local access to the system.
🏢 Internal Only: HIGH - Any internal user with windscribe group membership can exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local user access and windscribe group membership. Public technical details and proof-of-concept are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.18.3-alpha or v2.18.8

Vendor Advisory: https://github.com/Windscribe/Desktop-App

Restart Required: Yes

Instructions:

1. Update Windscribe to v2.18.8 or later. 2. Restart the Windscribe service. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Remove users from windscribe group

linux

Temporarily remove non-essential users from the windscribe group to limit attack surface

sudo gpasswd -d username windscribe

Restrict sudo privileges

linux

Ensure windscribe group does not have unnecessary sudo privileges

sudo visudo
Review and remove any windscribe group entries in sudoers

🧯 If You Can't Patch

  • Implement strict access controls to limit windscribe group membership to essential users only
  • Monitor for suspicious command execution patterns and root privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windscribe version and verify if users are in windscribe group: windscribe --version && groups | grep windscribe

Check Version:

windscribe --version

Verify Fix Applied:

Confirm version is v2.18.8 or later: windscribe --version

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution by windscribe process
  • Root privilege escalation from windscribe user context
  • Suspicious MTU change operations

Network Indicators:

  • Unexpected outbound connections from windscribe process
  • Command and control traffic originating from VPN interface

SIEM Query:

process_name:"windscribe" AND (command_line:"adapterName" OR command_line:"changeMTU")

🔗 References

📤 Share & Export