First published: Wed Oct 10 2018(Updated: )
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinc-vpn Tinc | <1.0.30 | |
Starwindsoftware Starwind Virtual San Vsphere | =v8-build12533 | |
Starwindsoftware Starwind Virtual San Vsphere | =v8-build12658 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16737 is a vulnerability in the tinc VPN software before version 1.0.30 that allows for a broken authentication protocol without any partial mitigation.
CVE-2018-16737 has a severity rating of 5.3 (medium).
To fix CVE-2018-16737, you should update your tinc VPN software to version 1.0.30 or newer.
You can find more information about CVE-2018-16737 at the following references: [http://tinc-vpn.org/security/](http://tinc-vpn.org/security/), [http://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a](http://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a), [https://www.starwindsoftware.com/security/sw-20190227-0001/](https://www.starwindsoftware.com/security/sw-20190227-0001/)
CVE-2018-16737 is associated with CWE-287, which refers to an authentication error vulnerability.