OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements | vendor advisory |
https://community.openvpn.net/openvpn/wiki/CVE-2021-3547 | patch vendor advisory |