CVE-2020-7041Improper Certificate Validation in Project Openfortivpn

Severity
5.3MEDIUMNVD
EPSS
0.8%
top 25.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 27
Latest updateMay 24

Description

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

Also affects: Fedora 30, 31, 32

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gj3x-586x-w7gm: An issue was discovered in openfortivpn 12022-05-24
OSV
CVE-2020-7041: An issue was discovered in openfortivpn 12020-02-27
CVEList
CVE-2020-7041: An issue was discovered in openfortivpn 12020-02-27

📋Vendor Advisories

1
Debian
CVE-2020-7041: openfortivpn - An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or l...2020

🕵️Threat Intelligence

2
Unit42
Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility2021-08-17
Unit42
Personal VPN and Its Evasions: Risk Factors and How to Maintain Network Visibility2021-08-17

💬Community

1
Bugzilla
CVE-2020-7041 openfortivpn: mishandling of certificate validation due to X509_check_host negative error code2020-05-05
CVE-2020-7041 — Improper Certificate Validation | cvebase