First published: Mon Jan 20 2025(Updated: )
Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
Easy-RSA | >=3.0.5<=3.1.7 | |
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13454 is considered a medium severity vulnerability due to its potential to allow local attackers to brute force private CA keys.
To fix CVE-2024-13454, upgrade your Easy-RSA version to 3.1.8 or later which addresses the weak encryption algorithm.
CVE-2024-13454 affects Easy-RSA versions 3.0.5 through 3.1.7.
CVE-2024-13454 cannot be exploited remotely as it requires local access to the system.
CVE-2024-13454 impacts the Easy-RSA tool when it uses OpenSSL 3 for creating CA keys.