In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root.
References
Configurations
No configuration.
History
19 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-19 19:15
Updated : 2025-04-21 14:23
NVD link : CVE-2025-43917
Mitre link : CVE-2025-43917
CVE.ORG link : CVE-2025-43917
JSON object : View
Products Affected
No product.
CWE
CWE-863
Incorrect Authorization