CVE Vulnerabilities

CVE-2021-20230

Improper Certificate Validation

Published: Feb 23, 2021 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

NameVendorStart VersionEnd Version
StunnelStunnel*5.57 (excluding)
Red Hat Enterprise Linux 8RedHatstunnel-0:5.56-5.el8_3*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatstunnel-0:5.48-6.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatstunnel-0:5.48-6.el8_2*
Stunnel4Ubuntubionic*
Stunnel4Ubuntuesm-apps/bionic*
Stunnel4Ubuntuesm-apps/focal*
Stunnel4Ubuntufocal*
Stunnel4Ubuntugroovy*
Stunnel4Ubuntuhirsute*
Stunnel4Ubuntuimpish*
Stunnel4Ubuntutrusty*
Stunnel4Ubuntuupstream*
Stunnel4Ubuntuxenial*

Potential Mitigations

References