OpenVPN Access Server older than version 2.8.4 and version 2.9.5 generates new user authentication tokens instead of reusing exiting tokens on reconnect making it possible to circumvent the initial token expiry timestamp.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openvpn_access_server | Openvpn | * | 2.8.4 (excluding) |
Openvpn_access_server | Openvpn | 2.9.0 (including) | 2.9.6 (excluding) |
Openvpn | Ubuntu | eoan | * |
Openvpn | Ubuntu | trusty | * |