First published: Thu Feb 27 2020(Updated: )
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openfortivpn Project Openfortivpn | <1.12.0 | |
OpenSSL OpenSSL | <=1.0.2 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7041 is medium with a severity value of 5.3.
The affected software for CVE-2020-7041 is openfortivpn version 1.11.0 when used with OpenSSL 1.0.2 or later.
CVE-2020-7041 affects OpenSSL by mishandling certificate validation when used with openfortivpn 1.11.0.
Yes, Fedora versions 30, 31, and 32 are affected by CVE-2020-7041.
To fix CVE-2020-7041, update openfortivpn to version 1.12.0 or higher.