CVE-2021-28681
Summary
| CVE | CVE-2021-28681 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-18 04:15:00 UTC |
| Updated | 2021-03-25 13:45:00 UTC |
| Description | Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Failed DTLS certificate verification doesn't stop data channel communication · Advisory · pion/webrtc · GitHub |
MISC |
github.com |
|
| DTLS Fingerprints in SDP Offer/Answer are not verified · Issue #1708 · pion/webrtc · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 982400 Go (go) Security Update for github.com/pion/webrtc/v3 (GHSA-74xm-qj29-cq8p)