Vulnerability Details : CVE-2006-2229
OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.
Vulnerability category: Denial of service
Products affected by CVE-2006-2229
- cpe:2.3:a:openvpn:openvpn:2.0_beta10:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta11:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta12:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta13:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta7:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta8:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta9:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc10:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc6:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test20:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test21:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test22:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta19:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta20:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta28:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc15:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc16:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc17:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc18:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test10:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test11:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test12:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test14:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test15:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test29:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test3:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test5:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test6:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc7:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta16:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta18:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc11:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc13:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc21:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc7:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc9:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test16:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test18:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test24:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test27:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test7:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test9:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.1_rc6:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta15:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta17:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc12:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc14:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc19:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc20:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_rc8:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test17:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test19:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test23:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test26:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test8:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.3_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.2_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test4:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0.6_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn:2.0_test25:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:openvpn:openvpn_access_server:2.0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-2229
1.60%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-2229
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:N/A:P |
4.9
|
4.9
|
NIST |
References for CVE-2006-2229
-
http://www.securityfocus.com/archive/1/433000/100/0/threaded
-
http://www.securityfocus.com/archive/1/432863/100/0/threaded
-
http://www.securityfocus.com/archive/1/432867/100/0/threaded
-
http://openvpn.net/man.html
Resources For OpenVPN OpenSource Community | OpenVPN
Jump to