
Cloud Vulnerability DB
A community-led vulnerabilities database
All versions of Windscribe VPN for Mac and Windows <= v2.02.10 contain a local privilege escalation vulnerability in the WindscribeService. The vulnerability was discovered and responsibly disclosed in September 2020 (Security Advisory).
The vulnerability exists in the way Windscribe handles custom OpenVPN configuration files. The OpenVPN executable packaged with Windscribe runs as SYSTEM privileges and allows users to specify custom OpenVPN config files. A malicious user could exploit this by creating a malicious configuration file that executes arbitrary code with SYSTEM privileges through the script-security and up directives (Security Advisory).
If successfully exploited, this vulnerability allows an authenticated local attacker to elevate their privileges to SYSTEM level on Windows systems, effectively gaining complete control over the affected system (Security Advisory).
Users should update their Windscribe VPN client to a version newer than v2.02.10 which contains fixes for this vulnerability (Security Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."