8.8
CVSSv3

CVE-2021-38112

Published: 22/09/2021 Updated: 30/09/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

In the Amazon AWS WorkSpaces client 3.0.10 up to and including 3.1.8 on Windows, argument injection in the workspaces:// URI handler can lead to remote code execution because of the Chromium Embedded Framework (CEF) --gpu-launcher argument. This is fixed in 3.1.9.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

amazon aws workspaces

Github Repositories

Cloud Security - Attacks AWS Privilege Escalation to SYSTEM in AWS VPN Client rhinosecuritylabscom/aws/cve-2022-25165-aws-vpn-client/ AWS WorkSpaces Remote Code Execution rhinosecuritylabscom/aws/cve-2021-38112-aws-workspaces-rce/ Resource Injection in CloudFormation Templates rhinosecuritylabscom/aws/cloud-malware-cloudformation-injection/ Down

Cloud Security - Attacks AWS Privilege Escalation to SYSTEM in AWS VPN Client rhinosecuritylabscom/aws/cve-2022-25165-aws-vpn-client/ AWS WorkSpaces Remote Code Execution rhinosecuritylabscom/aws/cve-2021-38112-aws-workspaces-rce/ Resource Injection in CloudFormation Templates rhinosecuritylabscom/aws/cloud-malware-cloudformation-injection/ Down

Cloud Security - Attacks AWS Privilege Escalation to SYSTEM in AWS VPN Client rhinosecuritylabscom/aws/cve-2022-25165-aws-vpn-client/ AWS WorkSpaces Remote Code Execution rhinosecuritylabscom/aws/cve-2021-38112-aws-workspaces-rce/ Resource Injection in CloudFormation Templates rhinosecuritylabscom/aws/cloud-malware-cloudformation-injection/ Down

Cloud Service Provider security mistakes This page lists security mistakes by cloud service providers (AWS, GCP, and Azure) These are public mistakes on the cloud providers' side of the shared responsibility model This may be CVEs or bug bounties for issues in the services they run, but could also be in client software they provide, guidance they have given, failed audit

Rhino CVE Proof-of-Concept Exploits A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs CVE-2022-25372: Local Privilege Escalation In Pritunl VPN Client CVE-2022-25237: Authorization Bypass Leading to RCE in Bonitasoft Web CVE-2022-25166: AWS VPN Client Arbitrary File Write as SYSTEM CVE-2022-25165: AWS VPN Client Infor

Rhino CVE Proof-of-Concept Exploits A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs CVE-2022-25372: Local Privilege Escalation In Pritunl VPN Client CVE-2022-25237: Authorization Bypass Leading to RCE in Bonitasoft Web CVE-2022-25166: AWS VPN Client Arbitrary File Write as SYSTEM CVE-2022-25165: AWS VPN Client Infor

Rhino CVE Proof-of-Concept Exploits A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs CVE-2022-25372: Local Privilege Escalation In Pritunl VPN Client CVE-2022-25237: Authorization Bypass Leading to RCE in Bonitasoft Web CVE-2022-25166: AWS VPN Client Arbitrary File Write as SYSTEM CVE-2022-25165: AWS VPN Client Infor