Vulnerability Details : CVE-2023-31192
An information disclosure vulnerability exists in the ClientConnect() functionality of SoftEther VPN 5.01.9674. A specially crafted network packet can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.
Vulnerability category: Information leak
Products affected by CVE-2023-31192
- cpe:2.3:a:softether:vpn:5.01.9674:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31192
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.6
|
3.6
|
Talos |
CWE ids for CVE-2023-31192
-
The code uses a variable that has not been initialized, leading to unpredictable or unintended results.Assigned by: talos-cna@cisco.com (Secondary)
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-31192
-
https://www.softether.org/9-about/News/904-SEVPN202301
2023/06/30: SE202301: Security Advisory: CVE-2023-27395 etc: Fixed 6 vulnerabilities of SoftEther VPN in cooperation with Cisco Systems, Inc. - SoftEther VPN ProjectPatch;Vendor Advisory
-
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1768
TALOS-2023-1768 || Cisco Talos Intelligence Group - Comprehensive Threat IntelligenceExploit;Third Party Advisory
Jump to