#VU77847 Improper access control in SoftEther VPN


Vulnerability identifier: #VU77847

Vulnerability risk: Medium

CVSSv3.1: 6.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-27516

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SoftEther VPN
Server applications / Remote access servers, VPN

Vendor: SoftEther VPN Project

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can make an administrative connection if the remote administration feature is accidentally enabled without the password being set.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

SoftEther VPN: 4.41 9787


External links
http://jvn.jp/en/jp/JVN64316789/index.html
http://www.softether.org/9-about/News/904-SEVPN202301


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability