OpenVPN.openvpn is vulnerable to Improper Check for Unusual or Exceptional Conditions
24
Low Risk
Affected versions of OpenVPN between 2.6.1 and 2.6.13 are vulnerable to a denial of service when using --tls-crypt-v2. A malicious actor with access to a valid tls-crypt-v2 client key, or with the ability to observe a handshake using such a key, can trigger an ASSERT() failure on the server by sending a crafted combination of authenticated and malformed packets. This causes the server to abort. The vulnerability does not compromise cryptographic integrity, leak data, or allow remote code execution, and it does not affect OpenVPN clients.
You are affected if you are using a version that falls within the vulnerable range.
OpenVPN.openvpn is vulnerable to Improper Check for Unusual or Exceptional Conditions in versions 2.6.1 - 2.6.13.
Upgrade the OpenVPN.openvpn library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant