Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-15078

Published: 26 April 2021

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
openvpn
Launchpad, Ubuntu, Debian
bionic
Released (2.4.4-2ubuntu1.5)
focal
Released (2.4.7-1ubuntu2.20.04.2)
groovy
Released (2.4.9-3ubuntu1.1)
hirsute
Released (2.5.1-1ubuntu1.1)
impish
Released (2.5.1-2)
jammy
Released (2.5.1-2)
trusty Not vulnerable
(code not present)
upstream
Released (2.5.2)
xenial Not vulnerable
(code not present)
Patches:
upstream: https://github.com/OpenVPN/openvpn/commit/f7b3bf067ffce72e7de49a4174fd17a3a83f0573
upstream: https://github.com/OpenVPN/openvpn/commit/3d18e308c4e7e6f7ab7c2826c70d2d07b031c18a
upstream: https://github.com/OpenVPN/openvpn/commit/3aca477a1b58714754fea3a26d0892fffc51db6b
upstream: https://github.com/OpenVPN/openvpn/commit/0e5516a9d656ce86f7fb370c824344ea1760c255

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N