Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-11462

Опубликовано: 04 мая 2020
Источник: nvd
CVSS3: 7.5
CVSS2: 4.3
EPSS Низкий

Описание

An issue was discovered in OpenVPN Access Server before 2.7.0 and 2.8.x before 2.8.3. With the full featured RPC2 interface enabled, it is possible to achieve a temporary DoS state of the management interface when sending an XML Entity Expansion (XEE) payload to the XMLRPC based RPC2 interface. The duration of the DoS state depends on available memory and CPU speed. The default restricted mode of the RPC2 interface is NOT vulnerable.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*
Версия до 2.7.0 (исключая)
cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*
Версия от 2.8.0 (включая) до 2.8.3 (включая)

EPSS

Процентиль: 59%
0.00389
Низкий

7.5 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-776

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered in OpenVPN Access Server before 2.7.0 and 2.8.x before 2.8.3. With the full featured RPC2 interface enabled, it is possible to achieve a temporary DoS state of the management interface when sending an XML Entity Expansion (XEE) payload to the XMLRPC based RPC2 interface. The duration of the DoS state depends on available memory and CPU speed. The default restricted mode of the RPC2 interface is NOT vulnerable.

EPSS

Процентиль: 59%
0.00389
Низкий

7.5 High

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-776