Vulnerability Description
OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvpn | Openvpn | 3.6 |
Related Weaknesses (CWE)
References
- https://community.openvpn.net/openvpn/wiki/CVE-2021-3547PatchVendor Advisory
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsVendor Advisory
- https://community.openvpn.net/openvpn/wiki/CVE-2021-3547PatchVendor Advisory
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncementsVendor Advisory
FAQ
What is CVE-2021-3547?
CVE-2021-3547 is a vulnerability with a CVSS score of 7.4 (HIGH). OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in th...
How severe is CVE-2021-3547?
CVE-2021-3547 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3547?
Check the references section above for vendor advisories and patch information. Affected products include: Openvpn Openvpn.