windscribe CVE Vulnerabilities & Metrics

Focus on windscribe vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About windscribe Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with windscribe. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total windscribe CVEs: 6
Earliest CVE date: 23 May 2018, 12:29 UTC
Latest CVE date: 21 Aug 2024, 17:15 UTC

Latest CVE reference: CVE-2024-6141

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical windscribe CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.93

Max CVSS: 7.2

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 2
7.0-8.9 2
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS windscribe CVEs

These are the five CVEs with the highest CVSS scores for windscribe, sorted by severity first and recency.

All CVEs for windscribe

CVE-2024-6141 windscribe vulnerability CVSS: 0 21 Aug 2024, 17:15 UTC

Windscribe Directory Traversal Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windscribe Service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23441.

CVE-2022-41141 windscribe vulnerability CVSS: 0 26 Jan 2023, 18:59 UTC

This vulnerability allows local attackers to escalate privileges on affected installations of Windscribe. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-16859.

CVE-2020-22809 windscribe vulnerability CVSS: 4.6 10 May 2021, 13:15 UTC

In Windscribe v1.83 Build 20, 'WindscribeService' has an Unquoted Service Path that facilitates privilege escalation.

CVE-2020-27518 windscribe vulnerability CVSS: 7.2 04 May 2021, 14:15 UTC

All versions of Windscribe VPN for Mac and Windows <= v2.02.10 contain a local privilege escalation vulnerability in the WindscribeService component. A low privilege user could leverage several openvpn options to execute code as root/SYSTEM.

CVE-2018-11479 windscribe vulnerability CVSS: 7.2 25 May 2018, 19:29 UTC

The VPN component in Windscribe 1.81 uses the OpenVPN client for connections. Also, it creates a WindScribeService.exe system process that establishes a \\.\pipe\WindscribeService named pipe endpoint that allows the Windscribe VPN process to connect and execute an OpenVPN process or other processes (like taskkill, etc.). There is no validation of the program name before constructing the lpCommandLine argument for a CreateProcess call. An attacker can run any malicious process with SYSTEM privileges through this named pipe.

CVE-2018-11334 windscribe vulnerability CVSS: 4.6 23 May 2018, 12:29 UTC

Windscribe 1.81 creates a named pipe with a NULL DACL that allows Everyone users to gain privileges or cause a denial of service via \\.\pipe\WindscribeService.