{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/730007#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\n\r\nTychon contains a privilege escalation vulnerability due to the use of an `OPENSSLDIR` variable that specifies a location where an unprivileged Windows user may be able to place files.\r\n\r\n### Description\r\n\r\nTychon includes an OpenSSL component that specifies an `OPENSSLDIR` variable as a subdirectory that my be controllable by an unprivileged user on Windows. Tychon contains a privileged service that uses this OpenSSL component. A user who can place a specially-crafted `openssl.cnf` file at an appropriate path may be able to achieve arbitrary code execution with SYSTEM privileges.\r\n\r\n### Impact\r\nBy placing a specially-crafted `openssl.cnf` in a location used by Tychon, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Tychon software installed.\r\n\r\n### Solution\r\n#### Apply an update\r\nThis issue is addressed in Tychon 1.7.857.82\r\n\r\n### Acknowledgements\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"CVE-2022-26872 has been resolved with an update to the OpenSSL library  TYCHON uses.  The TYCHON Endpoint version 1.7.857.82 contains the fix to this vulnerability.","title":"Vendor statment from Tychon"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/730007"}],"title":"Tychon is vulnerable to privilege escalation due to OPENSSLDIR location","tracking":{"current_release_date":"2022-04-28T13:07:20+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#730007","initial_release_date":"2022-04-28 13:07:20.456858+00:00","revision_history":[{"date":"2022-04-28T13:07:20+00:00","number":"1.20220428130720.1","summary":"Released on 2022-04-28T13:07:20+00:00"}],"status":"final","version":"1.20220428130720.1"}},"vulnerabilities":[{"title":"Tychon is vulnerable to privilege escalation due to OPENSSLDIR location.","notes":[{"category":"summary","text":"Tychon is vulnerable to privilege escalation due to OPENSSLDIR location."}],"cve":"CVE-2022-26872","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#730007"}],"product_status":{"known_affected":["CSAFPID-82557474-39e5-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Tychon","product":{"name":"Tychon Products","product_id":"CSAFPID-82557474-39e5-11f1-8422-122e2785dc9f"}}]}}