First published: Wed Jul 06 2022(Updated: )
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack.
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
Openvpn Openvpn Access Server | <2.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenVPN Access Server vulnerability is CVE-2021-4234.
The severity of CVE-2021-4234 is high with a CVSS score of 7.5.
OpenVPN Access Server 2.10 and prior versions are affected by CVE-2021-4234.
CVE-2021-4234 allows an attacker to resend multiple packets in response to a reset packet from the client, resulting in a limited amplification attack.
To fix CVE-2021-4234, you should update OpenVPN Access Server to version 2.11.0 or later.