Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jj25-48fw-gp3v

Опубликовано: 06 июл. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.

Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.

EPSS

Процентиль: 30%
0.00113
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 5.8
nvd
больше 2 лет назад

Teltonika’s Remote Management System versions prior to 4.10.0 contain a virtual private network (VPN) hub feature for cross-device communication that uses OpenVPN. It connects new devices in a manner that allows the new device to communicate with all Teltonika devices connected to the VPN. The OpenVPN server also allows users to route through it. An attacker could route a connection to a remote server through the OpenVPN server, enabling them to scan and access data from other Teltonika devices connected to the VPN.

EPSS

Процентиль: 30%
0.00113
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-918