CVE-2016-7064

Published on: 07/21/2020 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Certain versions of Pritunl-client from Pritunl contain the following vulnerability:

A flaw was found in pritunl-client before version 1.0.1116.6. A lack of signature verification leads to sensitive information leakage

  • CVE-2016-7064 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Release Pritunl Client v1.0.1116.6 · pritunl/pritunl-client-electron · GitHub Release Notes
Third Party Advisory
github.com
text/html
URL Logo MISC github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6,
Broken Link
lf.lc
text/plain
MISC lf.lc/CVE-2016-7064.txt

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPritunlPritunl-clientAllAllAllAll
ApplicationPritunlPritunl-clientAllAllAllAll
  • cpe:2.3:a:pritunl:pritunl-client:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:pritunl:pritunl-client:*:*:*:*:*:*:*:*: