CVE-2025-43917
19.04.2025, 19:15
In Pritunl Client before 1.3.4220.57, an administrator with access to /Applications can escalate privileges after uninstalling the product. Specifically, an administrator can insert a new file at the pathname of the removed pritunl-service file. This file then is executed by a LaunchDaemon as root.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.