Description
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
Related CPE's
a
openvpn
openvpn
2
References
https://community.openvpn.net/openvpn/wiki/CVE-2021-3547
PatchVendor Advisory
https://community.openvpn.net/openvpn/wiki/CVE-2021-3547
PatchVendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-07-12T09:15:08.233Z
4 years agoLast modified
2024-11-21T05:21:48.747Z
1 year ago