CVE-2010-3901Improper Input Validation in Openconnect

Severity
6.4MEDIUMNVD
EPSS
0.2%
top 56.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 14
Latest updateMay 17

Description

OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option.

CVSS vector

AV:N/AC:L/C:P/I:P/A:NExploitability: 10.0 | Impact: 4.9

Affected Packages2 packages

Debianinfradead/openconnect< 2.25-0.1+3

🔴Vulnerability Details

3
GHSA
GHSA-92px-2chv-hqhf: OpenConnect before 22022-05-17
OSV
CVE-2010-3901: OpenConnect before 22010-10-14
CVEList
CVE-2010-3901: OpenConnect before 22010-10-12

💥Exploits & PoCs

1
Exploit-DB
Microsoft DirectX DirectShow - SAMI Buffer Overflow (MS07-064) (Metasploit)2010-10-05

📋Vendor Advisories

1
Debian
CVE-2010-3901: openconnect - OpenConnect before 2.25 does not properly validate X.509 certificates, which all...2010

💬Community

3
Bugzilla
CVE-2010-3902 OpenConnect: webvpn cookie content disclosure via debugging output2010-10-15
Bugzilla
CVE-2010-3901 OpenConnect: Always validate server certificate, check server hostname against its certificate2010-08-01
Bugzilla
OpenConnect: Always validate server certificate, check server hostname against its certificate [fedora-all]2010-08-01
CVE-2010-3901 — Improper Input Validation | cvebase