Vulnerability Description
An authentication bypass vulnerability exists in the CiRpcServerThread() functionality of SoftEther VPN 5.01.9674 and 4.41-9782-beta. An attacker can perform a local man-in-the-middle attack to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Softether | Vpn | 4.41-9782 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755ExploitThird Party Advisory
- https://www.softether.org/9-about/News/904-SEVPN202301PatchVendor Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1755ExploitThird Party Advisory
- https://www.softether.org/9-about/News/904-SEVPN202301PatchVendor Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1755
FAQ
What is CVE-2023-32634?
CVE-2023-32634 is a vulnerability with a CVSS score of 7.8 (HIGH). An authentication bypass vulnerability exists in the CiRpcServerThread() functionality of SoftEther VPN 5.01.9674 and 4.41-9782-beta. An attacker can perform a local man-in-the-middle attack to trigge...
How severe is CVE-2023-32634?
CVE-2023-32634 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32634?
Check the references section above for vendor advisories and patch information. Affected products include: Softether Vpn.