CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
OpenVPN Access Server 2.10 and prior versions are susceptible to resending multiple packets in a response to a reset packet sent from the client which the client again does not respond to, resulting in a limited amplification attack. | 7.5 |
High |
||
OpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal | 7.5 |
High |
||
The OpenVPN Access Server installer creates a log file readable for everyone, which from version 2.10.0 and before 2.11.0 may contain a random generated admin password | 7.5 |
High |