An information disclosure vulnerability exists in the ClientConnect() functionality of SoftEther VPN 5.01.9674. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
The product uses or accesses a resource that has not been initialized.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768 | third party advisory exploit |
https://www.softether.org/9-about/News/904-SEVPN202301 | patch vendor advisory |