CVE-2025-43917: CWE-863 Incorrect Authorization in Pritunl Pritunl-Client
In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root.
AI Analysis
Technical Summary
CVE-2025-43917 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting the Pritunl Client software prior to version 1.3.4220.57. The vulnerability arises during the uninstallation process of the Pritunl Client on macOS systems, specifically when an administrator has access to the /Applications directory. After the Pritunl Client is uninstalled, the service file named 'pritunl-service' is removed. However, the uninstallation process does not prevent an administrator from placing a new file at the exact pathname where the 'pritunl-service' file was previously located. This newly inserted file is then executed by a LaunchDaemon with root privileges. Since LaunchDaemons run with elevated permissions, executing an attacker-controlled file at this location allows privilege escalation to root. The vulnerability requires administrative privileges to exploit, meaning an attacker must already have some level of administrative access to the system. No user interaction beyond the initial administrative access is needed. There are no known exploits in the wild at the time of publication, and no patches or updates have been linked yet. The flaw is rooted in improper authorization checks during the uninstall process, allowing a race condition or file replacement attack that leads to arbitrary code execution as root. This vulnerability specifically impacts macOS installations of the Pritunl Client, a VPN client widely used for secure remote access.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Pritunl Client for secure VPN connectivity. An attacker with administrative access on a macOS endpoint could escalate privileges to root, potentially gaining full control over the affected system. This could lead to unauthorized access to sensitive corporate resources, data exfiltration, or lateral movement within the network. Given that Pritunl is often used in enterprise environments to secure remote access, exploitation could undermine the confidentiality and integrity of communications and data. The vulnerability does not directly compromise the VPN server or network infrastructure but compromises the endpoint security posture. Organizations with macOS-based administrative workstations or laptops using Pritunl Client are at risk. The attack requires prior administrative access, so it is more likely to be leveraged in targeted attacks or insider threat scenarios. The availability of the system could also be affected if malicious payloads disrupt normal operations. Although no exploits are currently known in the wild, the ease of exploitation once administrative access is obtained makes this a notable risk for organizations with macOS endpoints in their security perimeter.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately audit all macOS systems running Pritunl Client to identify affected versions prior to 1.3.4220.57. 2) Restrict administrative access on macOS endpoints to trusted personnel only, minimizing the risk of privilege escalation from compromised accounts. 3) Monitor the /Applications directory for unauthorized file creation or modification, especially targeting the 'pritunl-service' file path, using file integrity monitoring tools. 4) Until an official patch is released, consider temporarily uninstalling Pritunl Client on macOS systems where administrative access cannot be tightly controlled or where the risk is unacceptable. 5) Implement endpoint detection and response (EDR) solutions capable of detecting suspicious LaunchDaemon executions or unexpected root-level process launches. 6) Educate system administrators on the risks of installing or uninstalling software with elevated privileges and the importance of verifying the integrity of service files post-uninstallation. 7) Follow closely for vendor updates and apply patches as soon as they become available. 8) Employ application whitelisting to prevent unauthorized binaries from executing as root via LaunchDaemons. These steps go beyond generic advice by focusing on monitoring the specific attack vector (file replacement in /Applications) and controlling administrative privileges on macOS endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Ireland, Switzerland
CVE-2025-43917: CWE-863 Incorrect Authorization in Pritunl Pritunl-Client
Description
In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root.
AI-Powered Analysis
Technical Analysis
CVE-2025-43917 is a medium-severity vulnerability classified under CWE-863 (Incorrect Authorization) affecting the Pritunl Client software prior to version 1.3.4220.57. The vulnerability arises during the uninstallation process of the Pritunl Client on macOS systems, specifically when an administrator has access to the /Applications directory. After the Pritunl Client is uninstalled, the service file named 'pritunl-service' is removed. However, the uninstallation process does not prevent an administrator from placing a new file at the exact pathname where the 'pritunl-service' file was previously located. This newly inserted file is then executed by a LaunchDaemon with root privileges. Since LaunchDaemons run with elevated permissions, executing an attacker-controlled file at this location allows privilege escalation to root. The vulnerability requires administrative privileges to exploit, meaning an attacker must already have some level of administrative access to the system. No user interaction beyond the initial administrative access is needed. There are no known exploits in the wild at the time of publication, and no patches or updates have been linked yet. The flaw is rooted in improper authorization checks during the uninstall process, allowing a race condition or file replacement attack that leads to arbitrary code execution as root. This vulnerability specifically impacts macOS installations of the Pritunl Client, a VPN client widely used for secure remote access.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, especially for those relying on Pritunl Client for secure VPN connectivity. An attacker with administrative access on a macOS endpoint could escalate privileges to root, potentially gaining full control over the affected system. This could lead to unauthorized access to sensitive corporate resources, data exfiltration, or lateral movement within the network. Given that Pritunl is often used in enterprise environments to secure remote access, exploitation could undermine the confidentiality and integrity of communications and data. The vulnerability does not directly compromise the VPN server or network infrastructure but compromises the endpoint security posture. Organizations with macOS-based administrative workstations or laptops using Pritunl Client are at risk. The attack requires prior administrative access, so it is more likely to be leveraged in targeted attacks or insider threat scenarios. The availability of the system could also be affected if malicious payloads disrupt normal operations. Although no exploits are currently known in the wild, the ease of exploitation once administrative access is obtained makes this a notable risk for organizations with macOS endpoints in their security perimeter.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take the following specific actions: 1) Immediately audit all macOS systems running Pritunl Client to identify affected versions prior to 1.3.4220.57. 2) Restrict administrative access on macOS endpoints to trusted personnel only, minimizing the risk of privilege escalation from compromised accounts. 3) Monitor the /Applications directory for unauthorized file creation or modification, especially targeting the 'pritunl-service' file path, using file integrity monitoring tools. 4) Until an official patch is released, consider temporarily uninstalling Pritunl Client on macOS systems where administrative access cannot be tightly controlled or where the risk is unacceptable. 5) Implement endpoint detection and response (EDR) solutions capable of detecting suspicious LaunchDaemon executions or unexpected root-level process launches. 6) Educate system administrators on the risks of installing or uninstalling software with elevated privileges and the importance of verifying the integrity of service files post-uninstallation. 7) Follow closely for vendor updates and apply patches as soon as they become available. 8) Employ application whitelisting to prevent unauthorized binaries from executing as root via LaunchDaemons. These steps go beyond generic advice by focusing on monitoring the specific attack vector (file replacement in /Applications) and controlling administrative privileges on macOS endpoints.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-19T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf7cb9
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/21/2025, 2:24:39 PM
Last updated: 1/7/2026, 6:08:32 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.