Vulnerability Description
GlobalProtect-openconnect versions prior to 2.0.0 (exclusive) are affected by incorrect access control in GPService through DBUS, GUI. The way GlobalProtect-Openconnect is set up enables arbitrary users to start a VPN connection to arbitrary servers. By hosting an openconnect compatible server, the attack can redirect the entire host's traffic via their own server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Globalprotect-Openconnect Project | Globalprotect-Openconnect | - |
References
- https://github.com/yuezk/GlobalProtect-openconnect/issues/114ExploitIssue TrackingMitigation
- https://github.com/yuezk/GlobalProtect-openconnect/issues/114#issuecomment-19140
- https://github.com/yuezk/GlobalProtect-openconnect/issues/114ExploitIssue TrackingMitigation
- https://github.com/yuezk/GlobalProtect-openconnect/issues/114#issuecomment-19140
FAQ
What is CVE-2021-45810?
CVE-2021-45810 is a vulnerability with a CVSS score of 7.5 (HIGH). GlobalProtect-openconnect versions prior to 2.0.0 (exclusive) are affected by incorrect access control in GPService through DBUS, GUI. The way GlobalProtect-Openconnect is set up enables arbitrary use...
How severe is CVE-2021-45810?
CVE-2021-45810 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-45810?
Check the references section above for vendor advisories and patch information. Affected products include: Globalprotect-Openconnect Project Globalprotect-Openconnect.