|
Highlighted Articles |
Vertical Escalation of Privileges CVE-2025-43711On This Page On 2025-03-14 Egor Filatov (Positive Technologies) informed Tunnelblick developers of a security vulnerability in Tunnelblick. This vulnerability has been assigned CVE-2025-43711. The developers released new versions of Tunnelblick to address the vulnerability on 2025-04-22. What is the vulnerability?The vulnerability is a vertical escalation of privileges which allows an attacker to obtain root privileges without any authentication or authorization if
The vulnerability does not give the attacker more privileges than the logged-in administrator could obtain by providing a password, fingerprint, or other authentication and authorization, but no such authentication or authorization is required. The vulnerability cannot be exploited on computers that have Tunnelblick installed; it can only be exploited on computers on which Tunnelblick was installed and then incompletely uninstalled. The vulnerability cannot be exploited if only a standard user is logged in. However, the first user created when macOS is installed is an administrator, and that is the user used by most macOS users. Prerequisites to exploiting the vulnerability
Exploiting the vulnerability
The next time the computer starts, macOS will run a program inside the specially-crafted Tunnelblick.app as root, before any user is logged in. Preventing an attackIf you want to keep using TunnelblickUpdate to Tunnelblick 7.0 or later, or 7.1beta01 or later, by using the built-in updater or by downloading and installing the new version over an old version. Both methods will preserve VPN configurations and settings. If you cannot update (for example, because you are using an older version of macOS which cannot run Tunnelblick 7.0 or later or 7.1beta01 or later):
Any one of these will prevent the attack. If/when you no longer wish to use Tunnelblick, uninstall it using the built-in uninstaller on the "Utilities" panel of Tunnelblick's "VPN Details" window, or using a the standalone Tunnelblick Uninstaller. For details, see Uninstalling Tunnelblick. If you do not want to use Tunnelblick
FAQHow can I tell if my computer is vulnerable to the attack?Your computer is vulnerable to the attack:
What versions of Tunnelblick are affected?Affected:
Not affected:
What is an "incomplete" uninstall?An uninstall is considered complete if it was done by the Tunnelblick program's built-in uninstaller or the standalone Tunnelblick Uninstaller. Some third-party "uninstall" or "clean up" programs may also perform complete uninstalls. Anything else is considered "incomplete". For example, if Tunnelblick was dragged from /Applications to the Trash, that is an incomplete uninstall. Does Tunnelblick need to be installed for the attack to work?
Does uninstalling Tunnelblick prevent the attack?Yes, but only if Tunnelblick was uninstalled by using its built-in uninstaller or the standalone Tunnelblick Uninstaller. Uninstallation using some third-party "uninstall" or "clean up" programs may also prevent the attack. What can I do to protect my computer if I have already dragged Tunnelblick to the Trash?See If you do not want to use Tunnelblick, above. Timeline2025-03-14 Initial report from Egor Filatov (Postive Technologies) to Tunnelblick developers. 2025-03-18 Tunnelblick developers understand and can reproduce the problem. 2025-03-25 Tunnelblick developers have an initial fix for the problem and started testing and refining it. 2025-03-28 Tunnelblick developers applied to MITRE Corporation for a CVE ID. 2025-04-16 MITRE assigned CVE-2025-43711 to the vulnerability. 2025-04-22 Tunnelblick 7.0 and 7.1beta01, which fix the problem, were released. 2025-06-04 Details of the vulnerability and this page were published. |