IXON VPN Client Vulnerability Let Attackers Escalate Privileges


Vulnerabilities discovered by Andreas Vikerup and Dan Rosenqvist of Shelltrail in the IXON VPN Client expose critical flaws in how configuration files are handled, earning a high CVSS score of 8.1. On Windows (CVE-2025-26169), a local attacker can exploit a race condition in the C:\Windows\Temp directory, using PowerShell to overwrite temporary configuration files and execute arbitrary code with SYSTEM-level privileges. On Linux (CVE-2025-26168), the flaw involves the world-writable /tmp/vpn_client_openvpn_configuration.ovpn file, where attackers can create a named pipe using mkfifo and inject malicious OpenVPN configurations to gain root access.

Read More


thumb-image

Solutions