Amplification Attack Vulnerability in OpenVPN Access Server
CVE-2021-4234
7.5HIGH
Summary
OpenVPN Access Server versions up to 2.10 are vulnerable to an amplification attack. The vulnerability arises when a client sends a reset packet, prompting the server to resend multiple packets in response. If the client does not react to these responses, it can lead to a situation where an attacker exploits this behavior to amplify traffic, potentially overwhelming the network.
Affected Version(s)
OpenVPN Access Server 2.10 and prior version
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved