{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T15:39:02.617","vulnerabilities":[{"cve":{"id":"CVE-2025-26169","sourceIdentifier":"cve@mitre.org","published":"2025-05-07T19:16:07.447","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"IXON VPN Client before 1.4.4 on Windows allows Local Privilege Escalation to SYSTEM because there is code execution from a configuration file that can be controlled by a low-privileged user. There is a race condition in which a temporary configuration file, in a world-writable directory, can be overwritten."},{"lang":"es","value":"IXON VPN Client anterior a la versión 1.4.4 en Windows permite la escalada de privilegios locales a SYSTEM porque se ejecuta código desde un archivo de configuración que puede ser controlado por un usuario con pocos privilegios. Existe una condición de ejecución que permite sobrescribir un archivo de configuración temporal, ubicado en un directorio con permisos de escritura universal."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.4,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]}],"references":[{"url":"https://ixon-cloud.my.salesforce.com/sfc/p/#1t000000vlSF/a/TX000000DQmH/WRGwuYg2iMsKX6NAIK3MygCUOlg0SPQ..YvGWrwfNeM","source":"cve@mitre.org"},{"url":"https://support.ixon.cloud/s/article/VPN-Client-installation-and-uninstallation","source":"cve@mitre.org"}]}}]}