First published: Mon Apr 26 2021(Updated: )
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/openvpn | <2.4.4-2ubuntu1.5 | 2.4.4-2ubuntu1.5 |
ubuntu/openvpn | <2.4.7-1ubuntu2.20.04.2 | 2.4.7-1ubuntu2.20.04.2 |
ubuntu/openvpn | <2.4.9-3ubuntu1.1 | 2.4.9-3ubuntu1.1 |
ubuntu/openvpn | <2.5.1-1ubuntu1.1 | 2.5.1-1ubuntu1.1 |
ubuntu/openvpn | <2.5.1-2 | 2.5.1-2 |
ubuntu/openvpn | <2.5.1-2 | 2.5.1-2 |
ubuntu/openvpn | <2.5.2 | 2.5.2 |
debian/openvpn | 2.5.1-3 2.6.3-1+deb12u2 2.6.12-1 | |
OpenVPN | <2.4.11 | |
OpenVPN | >=2.5.0<2.5.2 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =20.10 | |
Ubuntu Linux | =21.04 | |
Debian GNU/Linux | =9.0 | |
Fedora | =32 | |
Fedora | =33 | |
Fedora | =34 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =20.10 | |
Ubuntu | =21.04 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15078 is a vulnerability in OpenVPN 2.5.1 and earlier versions that allows remote attackers to bypass authentication and access control channel data.
CVE-2020-15078 has a severity rating of 7.5 (High).
OpenVPN versions 2.4.7-1+deb10u1, 2.5.1-3, 2.6.3-1+deb12u1, and 2.6.3-2 are affected.
To fix CVE-2020-15078, update OpenVPN to version 2.4.7-1+deb10u1, 2.5.1-3, 2.6.3-1+deb12u1, or 2.6.3-2.
You can find more information about CVE-2020-15078 at the following references: [link1], [link2], [link3].