Problem discovered: July 12th 2012 Vendor contacted: July 13th 2012 Advisory published: October 12th 2012
AUTHOR: Micha Borrmann (firstname.lastname@example.org) SySS GmbH D-72070 Tuebingen / Germany
APPLICATION: Windows Client AFFECTED VERSION: 1.1.5-5 (32 Bit Version) Remotely exploitable: Yes
DESCRIPTION: A User can not recognize an easy to perform man-in-the-middle attack, because the client is not validate the X.509 certificate from the VPN gateway. In an untrusted networking environment (like a Wifi hotspot), the current VPN connection should be classified as not encrypted.
VENDOR STATUS: The vendor published a fixed version (1.1.7) at 10/12/12.