First published: Thu Mar 21 2019(Updated: )
An exploitable unsafe default configuration vulnerability exists in the TURN server function of coTURN prior to version 4.5.0.9. By default, the TURN server runs an unauthenticated telnet admin portal on the loopback interface. This can provide administrator access to the TURN server configuration, which can lead to additional attacks. An attacker who can get access to the telnet port can gain administrator access to the TURN server.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/coturn | 4.5.1.1-1.1+deb10u2 4.5.2-3 4.6.1-1 | |
coturn | <4.5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4059 is an exploitable unsafe default configuration vulnerability in the TURN server function of coTURN prior to version 4.5.0.9.
CVE-2018-4059 has a severity rating of 9.8 (Critical).
The coturn package on Debian versions up to 4.5.0.9 is affected by CVE-2018-4059.
To remediate CVE-2018-4059, update the coturn package to version 4.5.0.9 or higher.