First published: Fri Dec 31 2004(Updated: )
Nortel Contivity VPN Client 2.1.7, 3.00, 3.01, 4.91, and 5.01, when opening a VPN tunnel, does not check the gateway certificate until after a dialog box has been displayed to the user, which creates a race condition that allows remote attackers to perform a man-in-the-middle (MITM) attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nortel Contivity | =3.01 | |
Nortel Contivity | =3.00 | |
Nortel Contivity | =2.1.7 | |
Nortel Contivity | =4.91 | |
Nortel Contivity | =5.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2621 has a moderate severity level due to the potential for man-in-the-middle attacks.
To mitigate CVE-2004-2621, update the Nortel Contivity VPN Client to a patched version that addresses the certificate check issue.
CVE-2004-2621 affects versions 2.1.7, 3.00, 3.01, 4.91, and 5.01 of the Nortel Contivity VPN Client.
CVE-2004-2621 facilitates a man-in-the-middle (MITM) attack due to the improper timing of certificate validation.
While CVE-2004-2621 is an older vulnerability, it remains a concern for users running affected versions of the Nortel Contivity VPN Client.