CVE-2020-15074
Summary
| CVE | CVE-2020-15074 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-07-14 18:15:00 UTC |
| Updated | 2021-11-23 22:25:00 UTC |
| Description | OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp. |
Risk And Classification
Problem Types: CWE-613
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openvpn | Openvpn Access Server | All | All | All | All |
| Application | Openvpn | Openvpn Access Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Access Server Release Notes | OpenVPN | CONFIRM | openvpn.net | Release Notes, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.