An authentication bypass vulnerability exists in the CiRpcAccepted() functionality of SoftEther VPN 4.41-9782-beta and 5.01.9674. A specially crafted network packet can lead to unauthorized access. An attacker can send a network request to trigger this vulnerability.
The product, by default, initializes an internal variable with an insecure or less secure value than is possible.
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1754 | third party advisory exploit |
https://www.softether.org/9-about/News/904-SEVPN202301 | patch vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1754 |