Upgrade to Aurora VPN Gateway 3.5.4 and later where possible.
VAPT-2026-04403 | Pre-authenticated directory traversal in Aurora VPN diagnostic export
Aurora VPN exposed a pre-authenticated file disclosure issue in its diagnostic export handler, allowing remote retrieval of arbitrary files from the appliance filesystem.
Case Overview
Upgrade to Aurora VPN Gateway 3.5.4 and later where possible.
Upgrade or rebuild toward Aurora VPN Gateway 3.5.4 and later.
Summary
Aurora VPN exposed a pre-authenticated file disclosure issue in its diagnostic export handler, allowing remote retrieval of arbitrary files from the appliance filesystem.
Affected Scope
How Attackers Can Misuse This
- Aurora VPN exposed a pre-authenticated file disclosure issue in its diagnostic export handler, allowing remote retrieval of arbitrary files from the appliance filesystem.
Root Cause
The handler normalized archive names after the destination path was joined, which allowed `../` segments to survive the security check. A crafted request reached privileged export logic early in the request lifecycle and streamed arbitrary files back to the client.
record: VAPT-2026-04403
severity: MEDIUM
product: Aurora VPN Gateway
target_versions: Aurora VPN Gateway 3.5.0 through 3.5.3
linked_cves: CVE-2026-44003
cvss_vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NWhat You Can Do
Treat exposed management surfaces and previously issued credentials as potentially compromised.
Rotate affected secrets, tokens, and privileged service credentials after remediation is applied.
Upgrade to Aurora VPN Gateway 3.5.4 or later, restrict the diagnostic export route at the edge, and rotate any credentials or key material stored on the affected appliance. Review access logs for unusual export requests containing encoded traversal sequences.
Tools
No downloadable tools or authenticated evidence packages are attached to this case.
What We Are Doing
Aurora Secure case is currently marked published, with patch status reported as published. VAPT continues to keep the public lifecycle aligned with coordinated disclosure milestones and remediation visibility.
Timeline
| Date | Description |
|---|---|
| Mar 29, 2026 | Submitted The researcher submitted the initial disclosure package. |
| Apr 4, 2026 | Validated The issue was validated and reserved for coordinated disclosure. |
| Apr 9, 2026 | Published The case was published with a public VAPT advisory and CVE writeup. |
More Information
Root-cause walkthrough and affected request flow.
Vendor remediation and rollout guidance.