Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
IXON VPN Client Vulnerability Let Attackers Escalate Privileges

IXON VPN Client Vulnerability Let Attackers Escalate Privileges

Posted on May 8, 2025May 8, 2025 By CWS

Vital vulnerabilities within the IXON VPN Shopper permit native attackers to realize system-level privileges on Home windows, Linux, and macOS programs. 

The failings, tracked as CVE-2025-26168 and CVE-2025-26169, have an effect on variations previous to 1.4.4 and will grant unauthorized customers full management over affected programs by a classy short-term file manipulation approach.

IXON, a Dutch supplier of commercial distant entry options, affords cloud-based VPN providers extensively utilized in industrial programs and operational know-how environments.

XON VPN Shopper Vulnerabilities

The vulnerabilities, uncovered by Andreas Vikerup and Dan Rosenqvist at cybersecurity agency Shelltrail throughout a routine safety evaluation, exploit weaknesses in how the IXON VPN shopper handles configuration information.

The vulnerabilities obtained a CVSS rating of 8.1 (Excessive), indicating their severe nature.

Home windows Exploitation (CVE-2025-26169)

On Home windows programs, attackers can exploit a race situation within the C:WindowsTemp listing, the place the VPN shopper briefly shops configuration information. 

By exploiting this vulnerability, an area attacker with restricted privileges can repeatedly overwrite the short-term configuration file with malicious content material utilizing PowerShell.

The assault leverages the truth that the VPN shopper runs as NT AuthoritySYSTEM, giving attackers the flexibility to execute arbitrary code with the best system privileges as soon as the poisoned configuration is processed.

Linux Exploitation (CVE-2025-26168)

The Linux variant of the assault targets the /tmp/vpn_client_openvpn_configuration.ovpn file, which is saved in a world-writable listing. 

Researchers found that attackers might create a named pipe (FIFO) at this location utilizing the mkfifo command and inject a malicious OpenVPN configuration.

This configuration can embrace directives like tls-verify with script-security 2, enabling root-level code execution. When the VPN shopper processes this configuration, it executes the attacker’s code with root privileges.

CVEsAffected ProductsImpactExploit PrerequisitesCVSS 3.1 ScoreCVE-2025-26168IXON VPN Shopper (Linux/macOS, ≤v1.4.3)Native Privilege Escalation to root– Native access- Potential to govern /tmp/vpn_client_openvpn_configuration.ovpn8.1 (Excessive)CVE-2025-26169IXON VPN Shopper (Home windows, ≤v1.4.3)Native Privilege Escalation to SYSTEM– Native access- Race situation exploitation in C:WindowsTemp directory8.1 (Excessive)

Patch Launched 

IXON has launched model 1.4.4 of its VPN shopper to handle these vulnerabilities. The patch implements safer storage places for configuration information, limiting entry to high-privilege customers solely. 

Safety specialists suggest that organizations utilizing IXON VPN Shopper take the next actions instantly:

Replace to model 1.4.4 or later from the official IXON cloud portal

Confirm profitable patching by checking the shopper model within the portal.

Contemplate implementing further entry controls for delicate programs.

Monitor programs for any indicators of compromise or unauthorized entry.

Customers are strongly suggested to improve to the most recent model, confirm profitable set up, and keep away from utilizing any weak releases to make sure the continued safety of their networks and important belongings.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Attackers, Client, Escalate, IXON, Privileges, VPN, Vulnerability

Post navigation

Previous Post: Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution
Next Post: Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

Related Posts

2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain Cyber Security News
Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers Cyber Security News
Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News
Critical React2Shell Vulnerability Under Attack Critical React2Shell Vulnerability Under Attack Cyber Security News
macOS Gatekeeper Explained: Strengthening System Defenses macOS Gatekeeper Explained: Strengthening System Defenses Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News