First published: Mon Sep 27 2021(Updated: )
furlongm openvpn-monitor through 1.1.3 allows Authorization Bypass to disconnect arbitrary clients.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/openvpn-monitor | <=1.1.3 | |
OpenVPN Monitor | <=1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-31606 is high.
A potential attacker can exploit CVE-2021-31606 to disconnect arbitrary clients by bypassing authorization.
Openvpn-monitor version 1.1.3 is affected by CVE-2021-31606.
To fix CVE-2021-31606, update to a version of Openvpn-monitor that is not affected by the vulnerability.
More information about CVE-2021-31606 can be found at the following references: [http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html](http://packetstormsecurity.com/files/164274/OpenVPN-Monitor-1.1.3-Authorization-Bypass-Denial-Of-Service.html), [https://github.com/furlongm/openvpn-monitor/releases](https://github.com/furlongm/openvpn-monitor/releases), [https://github.com/furlongm/openvpn-monitor/commit/ddb9d31ef0ec56f578bdacf99ebe9d68455ed8ca](https://github.com/furlongm/openvpn-monitor/commit/ddb9d31ef0ec56f578bdacf99ebe9d68455ed8ca).