First published: Tue Oct 17 2023(Updated: )
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials
Credit: security@openvpn.net security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
Openvpn Connect | <3.4.0.3121 | |
Openvpn Connect | <3.4.0.4506 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3761 is medium, with a severity value of 5.9.
CVE-2022-3761 allows man-in-the-middle attackers to intercept configuration profile download requests in OpenVPN Connect, potentially exposing the user's credentials.
OpenVPN Connect versions before 3.4.0.4506 (macOS) and before 3.4.0.3100 (Windows) are affected by CVE-2022-3761.
A man-in-the-middle attacker can exploit CVE-2022-3761 by intercepting configuration profile download requests in OpenVPN Connect and stealing the user's credentials.
Yes, upgrading to OpenVPN Connect version 3.4.0.4506 on macOS and version 3.4.0.3100 on Windows can fix CVE-2022-3761.