OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
References
Link | Resource |
---|---|
https://community.openvpn.net/openvpn/wiki/CVE-2021-3547 | Patch Vendor Advisory |
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: OpenVPN
Published: 2021-07-12T10:35:52
Updated: 2021-07-12T10:35:52
Reserved: 2021-05-11T00:00:00
Link: CVE-2021-3547
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-07-12T11:15:08.233
Modified: 2022-10-27T12:22:43.533
Link: CVE-2021-3547
JSON object: View
Redhat Information
No data.