Vulnerabilities
Vulnerable Software
Pritunl:  Security Vulnerabilities
Pritunl Client through 1.2.3019.52 on Windows allows local privilege escalation, related to an ACL entry for CREATOR OWNER in platform_windows.go.
CVSS Score
7.8
EPSS Score
0.004
Published
2022-02-20
Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.
CVSS Score
7.8
EPSS Score
0.0
Published
2021-04-30
Privilege escalation via arbitrary file write in pritunl electron client 1.0.1116.6 through v1.2.2550.20. Successful exploitation of the issue may allow an attacker to execute code on the effected system with root privileges.
CVSS Score
7.8
EPSS Score
0.003
Published
2020-11-19
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
CVSS Score
5.3
EPSS Score
0.553
Published
2020-10-01
A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.
CVSS Score
9.8
EPSS Score
0.008
Published
2020-07-21
A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage
CVSS Score
7.5
EPSS Score
0.001
Published
2020-07-21


Contact Us

Shodan ® - All rights reserved