MEDIUM · 5.9

CVE-2014-9754

The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before ...

Vulnerability Description

The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows an attacker to perform a Man in the Middle attack.

CVSS Score

5.9

MEDIUM

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
ViprinetMultichannel Vpn Router 300 Firmware2013070830
ViprinetMultichannel Vpn Router 300-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9754?

CVE-2014-9754 is a vulnerability with a CVSS score of 5.9 (MEDIUM). The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before ...

How severe is CVE-2014-9754?

CVE-2014-9754 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9754?

Check the references section above for vendor advisories and patch information. Affected products include: Viprinet Multichannel Vpn Router 300 Firmware, Viprinet Multichannel Vpn Router 300.