CVE-2024-38520
CVSS V2 None
CVSS V3 None
Description
SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. When SoftEtherVPN is deployed with L2TP enabled on a device, it introduces the possibility of the host being used for amplification/reflection traffic generation because it will respond to every packet with two response packets that are larger than the request packet size. These sorts of techniques are used by external actors who generate spoofed source IPs to target a destination on the internet. This vulnerability has been patched in version 5.02.5185.
Overview
- CVE ID
- CVE-2024-38520
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-06-26T18:59:25.088Z
- Last Modified Date
- 2024-06-26T20:53:01.101Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-j35p-p8pj-vqxq | x_refsource_CONFIRM |
https://github.com/SoftEtherVPN/SoftEtherVPN/commit/c2a7aa548137dc80c6aafdc645cf4dc34e0dc764 | x_refsource_MISC |
https://github.com/SoftEtherVPN/SoftEtherVPN/releases/tag/5.02.5185 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-38520 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38520 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-27 13:11:37 | Added to TrackCVE |