| CVE | CVE-2026-44003 | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Title | Pre-authenticated directory traversal in Aurora VPN diagnostic export | ||||||||||||||||||||||||||||||||||||
| Case Number | VAPT-2026-04403 | ||||||||||||||||||||||||||||||||||||
| Status | Published | ||||||||||||||||||||||||||||||||||||
| Credits |
| ||||||||||||||||||||||||||||||||||||
| Affected products |
| ||||||||||||||||||||||||||||||||||||
| CVSS |
| ||||||||||||||||||||||||||||||||||||
| References |
| ||||||||||||||||||||||||||||||||||||
| Problem type(s) |
| ||||||||||||||||||||||||||||||||||||
| Date published | Apr 9, 2026 | ||||||||||||||||||||||||||||||||||||
| Last modified | Apr 10, 2026, 13:43 UTC | ||||||||||||||||||||||||||||||||||||
Description
The handler normalized archive names after the destination path was joined, which allowed `../` segments to survive the security check. A crafted request reached privileged export logic early in the request lifecycle and streamed arbitrary files back to the client.
Known Detection Rules
Upgrade to Aurora VPN Gateway 3.5.4 or later, restrict the diagnostic export route at the edge, and rotate any credentials or key material stored on the affected appliance. Review access logs for unusual export requests containing encoded traversal sequences.
No authenticated YARA, Sigma, or KQL detection content is attached to this CVE.
References
Public VAPT advisory linked to this CVE.
Public vendor advisory or acknowledgment linked to this CVE.