First published: Tue May 13 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in the Admin web interface in OpenVPN Access Server before 1.8.5 allows remote attackers to hijack the authentication of administrators for requests that create administrative users.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Access Server | <=1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2692 is considered a high severity vulnerability due to the potential for remote attackers to hijack administrator authentication.
To fix CVE-2013-2692, upgrade to OpenVPN Access Server version 1.8.5 or later.
CVE-2013-2692 affects installations of OpenVPN Access Server versions prior to 1.8.5.
Cross-site request forgery in CVE-2013-2692 allows attackers to send unauthorized commands to the admin interface, potentially compromising user accounts.
There are no officially recommended workarounds for CVE-2013-2692, and applying the update is the best method to mitigate the risk.