Man-in-the-Middle Vulnerability in OpenVPN 3 Core Library
CVE-2021-3547
7.4HIGH
Summary
The OpenVPN 3 Core Library versions 3.6 and 3.6.1 are susceptible to a man-in-the-middle attack that enables an attacker to bypass certificate authentication. This is achieved by presenting an unrelated server certificate that shares the same hostname specified in the 'verify-x509-name' option of the client configuration. This vulnerability poses a significant risk as it undermines the integrity of secure connections.
Affected Version(s)
OpenVPN 3 Core Library 3.6 and 3.6.1
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved