Aerosol Posted March 13, 2015 Report Posted March 13, 2015 Mogwai Security Advisory MSA-2015-03----------------------------------------------------------------------Title: iPass Mobile Client service local privilege escalationProduct: iPass Mobile Client Affected versions: iPass Mobile Client 2.4.2.15122 (Newer version might be alsoaffected)Impact: medium Remote: noProduct link: http://www.ipass.com/laptops/Reported: 11/03/2015by: Hans-Martin Muench (Mogwai, IT-Sicherheitsberatung Muench)Vendor's Description of the Software:----------------------------------------------------------------------The iPass Open Mobile client for laptops is lightweight and always on.It provides easy, seamless connectivity across iPass, customer, and third-partynetworks, and allows you to mix and match carrier networks without disruptingyour users.The iPass Open Mobile client for laptops allows organizations to providegranularoptions for how employees connect to iPass Wi-Fi (the iPass Mobile Network),campus Wi-Fi, mobile broadband (3G/4G), Ethernet, and dial, using a singleplatform to manage all connections. Open Mobile also enables cost and securitycontrols that provide virtual private network (VPN) integration options; mobilebroadband 3G/4G usage controls for both data roaming and data usage; endpointintegrity verification that checks the security of the device at the point ofconnection; and several additional options for setting network connection andrestriction policies. Insight into an organizations mobility usage is providedthrough user and device activity and summary reports as well as mobile broadbandusage reports.-----------------------------------------------------------------------Vendor response:-----------------------------------------------------------------------"We do not consider this a vulnerability as it is how the product was designed"Business recommendation:-----------------------------------------------------------------------Disable the iPass service unless really required-- CVSS2 Ratings ------------------------------------------------------CVSS Base Score: 5.6Impact Subscore: 7.8Exploitability Subscore: 3.9CVSS v2 Vector (AV:L/AC:L/Au:N/C:P/I:C/A:N)-----------------------------------------------------------------------Vulnerability description:----------------------------------------------------------------------The iPass Open Mobile Windows Client utilizes named pipes for interprocesscommunication. One of these pipes accepts/forwards commands to the iPassplugin subsystem.A normal user can communicate with this pipe through the command line clientEPCmd.exe which is part of the iPass suite. A list of available commands canbe displayed via "System.ListAllCommands".The iPass pipe provides a "iPass.EventsAction.LaunchAppSysMode" command whichallows toexecute arbitrary commands as SYSTEM. This can be abused by a normal user toescalatehis local privileges.Please note that this issue can also be exploited remotely in version2.4.2.15122 asthe named pipe can also be called via SMB. However according to our information,the pipe is no longer remotely accessible in current versions of the iPassMobileclient.Proof of concept:----------------------------------------------------------------------The following EPCmd command line creates a local user "mogwai" with password"mogwai":EPCmd.exe iPass.EventsAction.LaunchAppSysMode c:\windows\system32\cmd.exe;"/cnet user mogwai mogwai /ADD;;Disclosure timeline:----------------------------------------------------------------------10/03/2015: Requesting security contact from iPass sales10/03/2015: Sales responded, will forward vulnerability information to thedevelopment11/03/2015: Sending vulnerability details11/03/2015: iPass asks which customer we represent11/03/2015: Responding that we don't represent any iPass customer12/03/2015: iPass responded, wont fix, says that the product works as designedAdvisory URL:----------------------------------------------------------------------https://www.mogwaisecurity.de/#lab----------------------------------------------------------------------Mogwai, IT-Sicherheitsberatung MuenchSteinhoevelstrasse 2/289075 Ulm (Germany)info@mogwaisecurity.deSource Quote