CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
45.2%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
A heap-based buffer overflow vulnerability exists in the vpnserver WpcParsePacket() functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to arbitrary code execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
[
{
"cpes": [
"cpe:2.3:a:softether_vpn:softether_vpn:*:*:*:*:*:*:*:*"
],
"vendor": "softether_vpn",
"product": "softether_vpn",
"versions": [
{
"status": "affected",
"version": "4.41-9782-beta"
},
{
"status": "affected",
"version": "5.01.9674"
},
{
"status": "affected",
"version": "5.02"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
45.2%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total