Логотип exploitDog
bind:CVE-2023-36672
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-36672

Количество 4

Количество 4

ubuntu логотип

CVE-2023-36672

больше 2 лет назад

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
EPSS: Низкий
nvd логотип

CVE-2023-36672

больше 2 лет назад

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
EPSS: Низкий
github логотип

GHSA-43fw-xm94-j3mx

больше 2 лет назад

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
EPSS: Низкий
fstec логотип

BDU:2023-05501

больше 2 лет назад

Уязвимость VPN-клиента программного средства антивирусной защиты Clario, связанная с отсутствием защиты передаваемых данных, позволяющая нарушителю отправить произвольный IP-трафик в виде открытого текста за пределы VPN-туннеля

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-36672

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-36672

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
github логотип
GHSA-43fw-xm94-j3mx

An issue was discovered in the Clario VPN client through 5.9.1.1662 for macOS. The VPN client insecurely configures the operating system such that traffic to the local network is sent in plaintext outside the VPN tunnel even if the local network is using a non-RFC1918 IP subnet. This allows an adversary to trick the victim into sending arbitrary IP traffic in plaintext outside the VPN tunnel. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in leakage of traffic in plaintext" rather than to only Clario.

CVSS3: 5.7
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-05501

Уязвимость VPN-клиента программного средства антивирусной защиты Clario, связанная с отсутствием защиты передаваемых данных, позволяющая нарушителю отправить произвольный IP-трафик в виде открытого текста за пределы VPN-туннеля

CVSS3: 5.7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу