CVE-2018-11479
HIGHWindscribe - Improper Input Validation
Title source: ruleDescription
The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/48021
metasploit
WORKING POC
EXCELLENT
by Emin Ghuliev, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/windscribe_windscribeservice_priv_esc.rb
Scores
CVSS v3
7.8
EPSS
0.2865
EPSS Percentile
96.6%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-20
Status
published
Products (1)
windscribe/windscribe
1.81
Published
May 25, 2018
Tracked Since
Feb 18, 2026