vendor:
OpenTFTP Server Single Port
by:
boku
7.2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: OpenTFTP Server Single Port
Affected Version From: 1.66
Affected Version To: 1.66
Patch Exists: NO
Related CWE: N/A
CPE: a:opentftp:opentftp_server_single_port
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows 10 (32-bit)
2020
OpenTFTP 1.66 – Local Privilege Escalation
On Windows, Open TFTP Server v1.66, suffers from insecure file & folder permissions. This allows a low-privilge, local attacker to escalate their permissions to Administrator; by replacing the 'TFTPServer' service binary with a maliciously-crafted, binary executable. The TFTP Server runs as an 'Auto_Start' Service, with 'LocalSystem' priviledges, after the default installation. After the attacker has planted the malicious binary, the code will be executed with System priviledges on the next boot of the windows device.
Mitigation:
Ensure that the folder permissions are set to secure values and that the service binary is not writable by low-privilege users.