CVE-2020-15074

OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.
References
Link Resource
https://openvpn.net/vpn-server-resources/release-notes/ Release Notes Vendor Advisory
https://openvpn.net/vpn-server-resources/release-notes/ Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
References () https://openvpn.net/vpn-server-resources/release-notes/ - Release Notes, Vendor Advisory () https://openvpn.net/vpn-server-resources/release-notes/ - Release Notes, Vendor Advisory

Information

Published : 2020-07-14 18:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15074

Mitre link : CVE-2020-15074

CVE.ORG link : CVE-2020-15074


JSON object : View

Products Affected

openvpn

  • openvpn_access_server
CWE
CWE-302

Authentication Bypass by Assumed-Immutable Data

CWE-613

Insufficient Session Expiration