CVE-2020-15074

OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.
References
Link Resource
https://openvpn.net/vpn-server-resources/release-notes/ Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*
cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*

History

22 Nov 2021, 19:15

Type Values Removed Values Added
Summary OpenVPN Access Server older than version 2.8.4 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp. OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.

Information

Published : 2020-07-14 18:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-15074

Mitre link : CVE-2020-15074

CVE.ORG link : CVE-2020-15074


JSON object : View

Products Affected

openvpn

  • openvpn_access_server
CWE
CWE-613

Insufficient Session Expiration

CWE-302

Authentication Bypass by Assumed-Immutable Data