First published: Mon May 04 2020(Updated: )
An issue was discovered in OpenVPN Access Server before 2.7.0 and 2.8.x before 2.8.3. With the full featured RPC2 interface enabled, it is possible to achieve a temporary DoS state of the management interface when sending an XML Entity Expansion (XEE) payload to the XMLRPC based RPC2 interface. The duration of the DoS state depends on available memory and CPU speed. The default restricted mode of the RPC2 interface is NOT vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openvpn Openvpn Access Server | <2.7.0 | |
Openvpn Openvpn Access Server | >=2.8.0<=2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11462 is a vulnerability in OpenVPN Access Server that allows for a temporary denial-of-service (DoS) state of the management interface.
CVE-2020-11462 can be exploited to achieve a temporary DoS state of the management interface when sending a specific XML Entity Expansion (XEE) payload.
OpenVPN Access Server versions before 2.7.0 and 2.8.x before 2.8.3 are affected by CVE-2020-11462.
CVE-2020-11462 has a severity score of 7.5 (High).
To fix CVE-2020-11462, it is recommended to update OpenVPN Access Server to version 2.7.0 or 2.8.3 or later.