Insufficient Session Expiration The advisory has been revoked - it doesn't affect any version of package openvpn_access_server  (opens in a new tab)


Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-OPENVPNACCESSSERVER-2383238
  • published26 Jan 2022
  • disclosed14 Jul 2020
  • creditUnknown

Introduced: 14 Jul 2020

CVE-2020-15074  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade openvpn_access_server to version 2.8.4, 2.9.6 or higher.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration. OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.

References