CVE-2018-11479

HIGH

Windscribe - Improper Input Validation

Title source: rule

Description

The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/48021
metasploit WORKING POC EXCELLENT
by Emin Ghuliev, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/windscribe_windscribeservice_priv_esc.rb

Scores

CVSS v3 7.8
EPSS 0.2865
EPSS Percentile 96.6%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-20
Status published
Products (1)
windscribe/windscribe 1.81
Published May 25, 2018
Tracked Since Feb 18, 2026