Description
An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-31278 | An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-02T12:16:36.884Z
Reserved: 2023-06-02T14:34:05.095Z
Link: CVE-2023-27516
Updated: 2024-07-31T20:16:51.806Z
Status : Modified
Published: 2023-10-12T16:15:11.670
Modified: 2024-11-21T07:53:04.520
Link: CVE-2023-27516
No data.
OpenCVE Enrichment
No data.
EUVD