First published: Wed Oct 10 2018(Updated: )
Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tinc | 1.0.35-2 1.0.36-2 | |
Tinc VPN | <=1.0.34 | |
Debian GNU/Linux | =9.0 | |
StarWind Virtual SAN | =v8-build12533 | |
StarWind Virtual SAN | =v8-build12658 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16758 is a vulnerability in Tinc VPN version 1.0.34 and earlier that allows a man-in-the-middle attack to disable VPN packet encryption.
The severity of CVE-2018-16758 is medium with a severity value of 5.9.
CVE-2018-16758 affects Tinc VPN version 1.0.34 and earlier by allowing a man-in-the-middle attack to disable packet encryption.
To fix CVE-2018-16758, update Tinc VPN to version 1.0.35-2 or 1.0.36-2.
More information about CVE-2018-16758 can be found at the following references: [1] [2] [3].