Vulnerabilities > CVE-2006-2229 - Unspecified vulnerability in Openvpn
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN openvpn
nessus
Summary
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
Vulnerable Configurations
Nessus
NASL family | Misc. |
NASL id | OPENVPN_MANAGEMENT_INTERFACE_ACCESSIBLE.NASL |
description | The remote host is running OpenVPN, an open source SSL VPN. The version of OpenVPN installed on the remote host does not require authentication to access the server |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21330 |
published | 2006-05-08 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21330 |
title | OpenVPN Unprotected Management Interface |
code |
|
References
- http://openvpn.net/man.html
- http://openvpn.net/man.html
- http://www.osvdb.org/25660
- http://www.osvdb.org/25660
- http://www.securityfocus.com/archive/1/432863/100/0/threaded
- http://www.securityfocus.com/archive/1/432863/100/0/threaded
- http://www.securityfocus.com/archive/1/432867/100/0/threaded
- http://www.securityfocus.com/archive/1/432867/100/0/threaded
- http://www.securityfocus.com/archive/1/433000/100/0/threaded
- http://www.securityfocus.com/archive/1/433000/100/0/threaded