The flaws, tracked as CVE-2025-26168 and CVE-2025-26169, enable local attackers to escalate privileges to root on Linux and SYSTEM on Windows, threatening the integrity and security of operational technology environments.
The IXON VPN Client is a proprietary application provided by the Dutch company IXON, designed to facilitate secure connections between remote users and industrial devices via a cloud-based portal.
The client operates as a privileged service-running as root on Linux and as NT AuthoritySYSTEM on Windows-and manages VPN sessions by temporarily storing OpenVPN configuration files on disk during connection setup.
The vulnerabilities stem from insecure handling of temporary OpenVPN configuration files:
/tmp/vpn_client_openvpn_configuration.ovpn An attacker with local access can pre-create a named pipe (FIFO) at this location using the mkfifo command: bashmkfifo /tmp/vpn_client_openvpn_configuration.ovpn When the VPN client attempts to write to this pipe, it stalls, allowing the attacker to inject a malicious OpenVPN configuration containing directives such as: textscript-security 2 tls-verify /tmp/malicious.sh If the VPN connection succeeds, OpenVPN executes the attacker’s script as root, resulting in local privilege escalation.C:WindowsTemp Although standard users cannot list this directory, they can create files and folders within it, gaining full permissions over their creations. while ($true) { Copy-Item .malicious.ovpn C:WindowsTempvpn_client_openvpn_configuration.ovpn } This attack does not require a successful VPN connection, making it especially potent.IXON responded promptly, releasing version 1.4.4 of the VPN Client, which addresses these vulnerabilities by relocating temporary configuration files to directories accessible only by privileged users and securing library loading paths.
Users are strongly advised to:
tar -xzf vpn_client_x64.tar.gz cd vpn_client_x64 sudo ./installFailure to patch leaves systems exposed to local privilege escalation, enabling attackers to gain full system control-posing a severe operational and security risk.
These findings, credited to Andreas Vikerup and Dan Rosenqvist at Shelltrail, highlight the critical importance of secure file management and privilege separation in security-sensitive software.
Industrial operators using IXON’s solutions should prioritize immediate updates and review access controls to mitigate exploitation risks1.
CVSS Score: 8.1 (High)
References:
The IXON VPN Client vulnerabilities exemplify how improper handling of temporary files can undermine system security, particularly in environments where remote access is critical.
Organizations must act swiftly to patch affected systems and reinforce best practices in software design and deployment.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post IXON VPN Client Vulnerability Allows Attackers to Escalate Privileges appeared first on Cyber Security News.
Anthropic has revealed the staggering initial results of Project Glasswing, a collaborative cybersecurity initiative designed…
In case you missed it and have been living under a rock, Shrek is back.…
Hackers are using telecom networks and hosting providers across the Middle East as a foundation…
A large-scale phishing campaign targeting the 2026 FIFA World Cup has grown far beyond what…
Russian state-sponsored threat groups significantly stepped up their cyber operations in 2025, using a range…
A widely-used JavaScript templating library called art-template has been weaponized to deliver a sophisticated iOS…
This website uses cookies.