Weak Random Generator in OpenVPN Access Server Web Portal
CVE-2022-33738

7.5HIGH

Key Information:

Vendor
Openvpn
Vendor
CVE Published:
6 July 2022

Summary

OpenVPN Access Server prior to version 2.11 utilizes a weak random number generator for generating user session tokens within its web portal. This vulnerability can potentially expose user session information, compromising the security of sessions and enabling session hijacking. Users of OpenVPN Access Server are advised to upgrade to mitigate risks associated with this vulnerability.

Affected Version(s)

OpenVPN Access Server until 2.11

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.