CVE-2020-36382

OpenVPN Access Server 2.7.3 to 2.8.7 allows remote attackers to trigger an assert during the user authentication phase via incorrect authentication token data in an early phase of the user authentication resulting in a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*

History

20 Sep 2022, 19:28

Type Values Removed Values Added
CWE CWE-754 CWE-617

11 Jun 2021, 17:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*
References (MISC) https://openvpn.net/vpn-server-resources/release-notes/ - (MISC) https://openvpn.net/vpn-server-resources/release-notes/ - Release Notes, Vendor Advisory
References (MISC) https://openvpn.net/security-advisory/access-server-security-update-cve-2020-15077-cve-2020-36382/ - (MISC) https://openvpn.net/security-advisory/access-server-security-update-cve-2020-15077-cve-2020-36382/ - Vendor Advisory
CWE CWE-754

04 Jun 2021, 11:32

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-04 11:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-36382

Mitre link : CVE-2020-36382

CVE.ORG link : CVE-2020-36382


JSON object : View

Products Affected

openvpn

  • openvpn_access_server
CWE
CWE-617

Reachable Assertion

CWE-754

Improper Check for Unusual or Exceptional Conditions