OpenConnect before 2.25 does not properly validate X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary AnyConnect SSL VPN servers via a crafted server certificate that (1) does not correspond to the server hostname or (2) is presented in circumstances involving a missing --cafile configuration option.
2010-10-14T05:58:42.893
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.4 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:P/A:N
10.0
4.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | infradead | openconnect | ≤ 2.22 | Yes |
Application | infradead | openconnect | 1.00 | Yes |
Application | infradead | openconnect | 1.10 | Yes |
Application | infradead | openconnect | 1.20 | Yes |
Application | infradead | openconnect | 1.30 | Yes |