First published: Wed Mar 10 2021(Updated: )
An integer buffer overflow in the Nginx webserver of ExpressVPN Router version 1 allows remote attackers to obtain sensitive information when the server running as reverse proxy via specially crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ExpressVPN ExpressVPN | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29238 is an integer buffer overflow vulnerability in the Nginx webserver of ExpressVPN Router version 1.
CVE-2020-29238 allows remote attackers to obtain sensitive information when the server is running as a reverse proxy via specially crafted requests.
CVE-2020-29238 has a severity rating of high, with a CVSS score of 7.5.
To fix CVE-2020-29238, it is recommended to update ExpressVPN Router to a version that has addressed the vulnerability.
Yes, you can find more information about CVE-2020-29238 at the following references: [expressvpn.com](http://expressvpn.com), [ja1sharma.com](http://ja1sharma.com/blog/2021/CVE-2020-29238/), [packetstormsecurity.com](http://packetstormsecurity.com/files/162152/ExpressVPN-VPN-Router-1.0-Integer-Overflow.html).