CVE-2020-7041

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
openfortivpn_projectopenfortivpn
𝑥
< 1.12.0
opensusebackports_sle
15.0:sp1
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openfortivpn
bullseye
1.15.0-1
fixed
buster
no-dsa
bookworm
1.19.0-2
fixed
sid
1.22.1-1
fixed
trixie
1.22.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openfortivpn
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
ignored
bionic
needs-triage
xenial
dne
trusty
dne
References