CVE-2014-9755

The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows remote attackers to perform a replay attack.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:viprinet:multichannel_vpn_router_300_firmware:2013070830:*:*:*:*:*:*:*
cpe:2.3:o:viprinet:multichannel_vpn_router_300_firmware:2013080900:*:*:*:*:*:*:*
cpe:2.3:h:viprinet:multichannel_vpn_router_300:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-01-20 15:59

Updated : 2024-02-28 15:44


NVD link : CVE-2014-9755

Mitre link : CVE-2014-9755

CVE.ORG link : CVE-2014-9755


JSON object : View

Products Affected

viprinet

  • multichannel_vpn_router_300_firmware
  • multichannel_vpn_router_300
CWE
CWE-20

Improper Input Validation