A denial-of-service vulnerability exists in the vpnserver ConnectionAccept() functionality of SoftEther VPN 5.02. A set of specially crafted network connections can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743 | Exploit Third Party Advisory |
Configurations
History
18 Oct 2023, 17:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Softether
Softether vpn |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:softether:vpn:5.02:*:*:*:*:*:*:* | |
References | (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743 - Exploit, Third Party Advisory | |
CWE | NVD-CWE-noinfo |
12 Oct 2023, 16:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-12 16:15
Updated : 2023-10-18 17:53
NVD link : CVE-2023-25774
Mitre link : CVE-2023-25774
JSON object : View
Products Affected
softether
- vpn
CWE