CVE-2020-36382

OpenVPN Access Server 2.7.3 to 2.8.7 allows remote attackers to trigger an assert during the user authentication phase via incorrect authentication token data in an early phase of the user authentication resulting in a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://openvpn.net/security-advisory/access-server-security-update-cve-2020-15077-cve-2020-36382/ - Vendor Advisory () https://openvpn.net/security-advisory/access-server-security-update-cve-2020-15077-cve-2020-36382/ - Vendor Advisory
References () https://openvpn.net/vpn-server-resources/release-notes/ - Release Notes, Vendor Advisory () https://openvpn.net/vpn-server-resources/release-notes/ - Release Notes, Vendor Advisory

Information

Published : 2021-06-04 11:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36382

Mitre link : CVE-2020-36382

CVE.ORG link : CVE-2020-36382


JSON object : View

Products Affected

openvpn

  • openvpn_access_server
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions

CWE-617

Reachable Assertion