First published: Tue Oct 12 2010(Updated: )
OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
infradead OpenConnect | <=2.22 | |
infradead OpenConnect | =1.00 | |
infradead OpenConnect | =1.10 | |
infradead OpenConnect | =1.20 | |
infradead OpenConnect | =1.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3901 is classified as a high severity vulnerability due to its potential exploitation by man-in-the-middle attackers.
To mitigate CVE-2010-3901, upgrade OpenConnect to version 2.25 or later, where the certificate validation issue has been resolved.
CVE-2010-3901 allows man-in-the-middle attacks where attackers can spoof AnyConnect SSL VPN servers using crafted server certificates.
CVE-2010-3901 affects OpenConnect versions prior to 2.25, including versions 1.00 through 2.22.
The vulnerability in CVE-2010-3901 involves improper validation of X.509 certificates, leading to potential security risks during VPN connections.