Zurück zur Übersicht

Lenze: VPN Client Privilege Escalation in combination with Lenze x500 IoT Gateway

VDE-2025-042
Last update
27.05.2025 11:00
Published at
27.05.2025 11:00
Vendor(s)
Lenze SE
External ID
VDE-2025-042
CSAF Document

Summary

The Lenze VPN client is vulnerable to a Local Privilege Escalation to root/SYSTEM by executing a configuration file which can be controlled by a non-privileged user. This occurs through a race condition exploit, where an attacker can overwrite the temporary OpenVPN configuration file located in a world-writable directory. By injecting malicious commands into the configuration file prior to its execution by the VPN client, an attacker can trigger arbitrary code execution with root/system privileges when a VPN connection is initiated. The vulnerability has been remediated in the version 1.4.4 of the Lenze VPN client.
Due to some further developments and completion of the functional scope, it is recommended to update the firmware of the x500 IoT Gateway devices immediately, regardless of the current security vulnerability in the VPN client.

Impact

This vulnerability allows local non-privileged users to escalate their privileges to root or SYSTEM by exploiting a race condition in the Lenze VPN Client. Successful exploitation could lead to full system compromise, enabling attackers to execute arbitrary code with elevated privileges.

Affected Product(s)

Model no. Product name Affected versions
Firmware x510 vers:all/* installed on x510 Lenze VPN Client <1.4.4
Firmware x520 vers:all/* installed on x520 Lenze VPN Client <1.4.4
Firmware x530 vers:all/* installed on x530 Lenze VPN Client <1.4.4
Firmware x540 vers:all/* installed on x540 Lenze VPN Client <1.4.4

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Incorrect Permission Assignment for Critical Resource (CWE-732)
Summary

IXON VPN Client before 1.4.4 on Windows allows Local Privilege Escalation to SYSTEM because there is code execution from a configuration file that can be controlled by a low-privileged user. There is a race condition in which a temporary configuration file, in a world-writable directory, can be overwritten.

References

Published
22.09.2025 14:58
Weakness
Incorrect Permission Assignment for Critical Resource (CWE-732)
References

Remediation

Obtain the updated VPN software (version >= 1.4.4) from cloud.lenze.digital/fleet-manager/too... and run the installer on a windows and macOS system or run the following
commands in an linux system:
tar -xzf vpn_client_x64.tar.gz
cd vpn_client_x64
sudo ./install

Revision History

Version Date Summary
1 27.05.2025 11:00 Initial version