OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man...
High severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Jul 12, 2021
Published to the GitHub Advisory Database
May 24, 2022
Last updated
Jan 30, 2023
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
References