{"api_version":"1","generated_at":"2026-04-23T02:57:19+00:00","cve":"CVE-2008-5121","urls":{"html":"https://cve.report/CVE-2008-5121","api":"https://cve.report/api/cve/CVE-2008-5121.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-5121","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-5121"},"summary":{"title":"CVE-2008-5121","description":"dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-11-18 00:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-264","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.2","severity":"","vector":"AV:L/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://www.exploit-db.com/exploits/5837","name":"https://www.exploit-db.com/exploits/5837","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Deterministic Network Enhancer dne2000.sys kernel ring0 SYSTEM exploit","mime":"text/x-c","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1865","name":"http://www.vupen.com/english/advisories/2008/1865","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.citrix.com/article/CTX117751","name":"http://support.citrix.com/article/CTX117751","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"CTX117751 - Privilege Escalation Vulnerability in Citrix Deterministic Network Enhancer (dne2000.sys) - Citrix Knowledge Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1866","name":"http://www.vupen.com/english/advisories/2008/1866","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/29772","name":"http://www.securityfocus.com/bid/29772","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Deterministic Network Enhancer 'dne2000.sys' Local Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2008/1868","name":"http://www.vupen.com/english/advisories/2008/1868","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860","name":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Cisco.com Login Page","mime":"text/html","httpstatus":"503","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1867","name":"http://www.vupen.com/english/advisories/2008/1867","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30753","name":"http://secunia.com/advisories/30753","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"BlueCoat WinProxy Deterministic Network Enhancer Privilege Escalation - Advisories - Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43153","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43153","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/4600","name":"http://securityreason.com/securityalert/4600","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityReason - Deterministic Network Enhancer dne2000.sys kernel ring0 SYSTEM exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.digit-labs.org/files/exploits/dne2000-call.c","name":"http://www.digit-labs.org/files/exploits/dne2000-call.c","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/x-c","httpstatus":"225","archivestatus":"200"},{"url":"http://secunia.com/advisories/30728","name":"http://secunia.com/advisories/30728","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Deterministic Network Enhancer Privilege Escalation Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30747","name":"http://secunia.com/advisories/30747","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Cisco VPN Client Deterministic Network Enhancer Privilege Escalation - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30744","name":"http://secunia.com/advisories/30744","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SafeNet Products Deterministic Network Enhancer Privilege Escalation - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/858993","name":"http://www.kb.cert.org/vuls/id/858993","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"US-CERT Vulnerability Note VU#858993","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-5121","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5121","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"5121","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bluecoat","cpe5":"winproxy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5121","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cisco","cpe5":"vpn_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5121","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"citrix","cpe5":"deterministic_network_enhancer","cpe6":"2.21.7.223","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5121","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"citrix","cpe5":"deterministic_network_enhancer","cpe6":"3.21.7.17464","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5121","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"highassurance_remote","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"5121","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"safenet","cpe5":"softremote_vpn_client","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T10:40:17.197Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"VU#858993","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/858993"},{"name":"ADV-2008-1867","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1867"},{"name":"5837","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/5837"},{"name":"ADV-2008-1868","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1868"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.digit-labs.org/files/exploits/dne2000-call.c"},{"name":"30728","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30728"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.citrix.com/article/CTX117751"},{"name":"29772","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/29772"},{"name":"4600","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/4600"},{"name":"ADV-2008-1865","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1865"},{"name":"30753","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30753"},{"name":"multiple-vendors-dne2000-priv-escalation(43153)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43153"},{"name":"ADV-2008-1866","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1866"},{"name":"30744","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30744"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860"},{"name":"30747","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30747"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-06-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-28T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"VU#858993","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/858993"},{"name":"ADV-2008-1867","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1867"},{"name":"5837","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/5837"},{"name":"ADV-2008-1868","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1868"},{"tags":["x_refsource_MISC"],"url":"http://www.digit-labs.org/files/exploits/dne2000-call.c"},{"name":"30728","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30728"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.citrix.com/article/CTX117751"},{"name":"29772","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/29772"},{"name":"4600","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/4600"},{"name":"ADV-2008-1865","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1865"},{"name":"30753","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30753"},{"name":"multiple-vendors-dne2000-priv-escalation(43153)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43153"},{"name":"ADV-2008-1866","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1866"},{"name":"30744","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30744"},{"tags":["x_refsource_MISC"],"url":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860"},{"name":"30747","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30747"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-5121","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"VU#858993","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/858993"},{"name":"ADV-2008-1867","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1867"},{"name":"5837","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/5837"},{"name":"ADV-2008-1868","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1868"},{"name":"http://www.digit-labs.org/files/exploits/dne2000-call.c","refsource":"MISC","url":"http://www.digit-labs.org/files/exploits/dne2000-call.c"},{"name":"30728","refsource":"SECUNIA","url":"http://secunia.com/advisories/30728"},{"name":"http://support.citrix.com/article/CTX117751","refsource":"CONFIRM","url":"http://support.citrix.com/article/CTX117751"},{"name":"29772","refsource":"BID","url":"http://www.securityfocus.com/bid/29772"},{"name":"4600","refsource":"SREASON","url":"http://securityreason.com/securityalert/4600"},{"name":"ADV-2008-1865","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1865"},{"name":"30753","refsource":"SECUNIA","url":"http://secunia.com/advisories/30753"},{"name":"multiple-vendors-dne2000-priv-escalation(43153)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43153"},{"name":"ADV-2008-1866","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1866"},{"name":"30744","refsource":"SECUNIA","url":"http://secunia.com/advisories/30744"},{"name":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860","refsource":"MISC","url":"http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860"},{"name":"30747","refsource":"SECUNIA","url":"http://secunia.com/advisories/30747"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-5121","datePublished":"2008-11-18T00:00:00.000Z","dateReserved":"2008-11-17T00:00:00.000Z","dateUpdated":"2024-08-07T10:40:17.197Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-11-18 00:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-264","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:deterministic_network_enhancer:2.21.7.223:*:*:*:*:*:*:*","matchCriteriaId":"10F0D8E9-67F6-4484-9BD1-A16228A41D0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:deterministic_network_enhancer:3.21.7.17464:*:*:*:*:*:*:*","matchCriteriaId":"153E29F0-3E68-4CF3-B5B3-8A63E101A650"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:bluecoat:winproxy:*:*:*:*:*:*:*:*","matchCriteriaId":"BC5D863E-670D-4849-960B-FEEA70C95E74"},{"vulnerable":false,"criteria":"cpe:2.3:a:cisco:vpn_client:*:*:*:*:*:*:*:*","matchCriteriaId":"099829D2-EC37-4BEF-91B7-375478189C1B"},{"vulnerable":false,"criteria":"cpe:2.3:a:safenet:highassurance_remote:*:*:*:*:*:*:*:*","matchCriteriaId":"7212B1EF-2AD3-42DD-A6D7-DB18F3ED2923"},{"vulnerable":false,"criteria":"cpe:2.3:a:safenet:softremote_vpn_client:*:*:*:*:*:*:*:*","matchCriteriaId":"0C384818-1B30-4EBA-99DE-E64008F72985"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"5121","Ordinal":"1","Title":"CVE-2008-5121","CVE":"CVE-2008-5121","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"5121","Ordinal":"1","NoteData":"dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface.","Type":"Description","Title":"CVE-2008-5121"},{"CveYear":"2008","CveId":"5121","Ordinal":"2","NoteData":"2008-11-17","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"5121","Ordinal":"3","NoteData":"2017-09-28","Type":"Other","Title":"Modified"}]}}}