CVE Vulnerabilities

CVE-2021-20230

Improper Certificate Validation

Published: Feb 23, 2021 | Modified: Jun 01, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.

Weakness

The product does not validate, or incorrectly validates, a certificate.

Affected Software

Name Vendor Start Version End Version
Stunnel Stunnel * 5.57 (excluding)
Red Hat Enterprise Linux 8 RedHat stunnel-0:5.56-5.el8_3 *
Red Hat Enterprise Linux 8.1 Extended Update Support RedHat stunnel-0:5.48-6.el8_1 *
Red Hat Enterprise Linux 8.2 Extended Update Support RedHat stunnel-0:5.48-6.el8_2 *
Stunnel4 Ubuntu bionic *
Stunnel4 Ubuntu esm-apps/bionic *
Stunnel4 Ubuntu focal *
Stunnel4 Ubuntu groovy *
Stunnel4 Ubuntu hirsute *
Stunnel4 Ubuntu impish *
Stunnel4 Ubuntu trusty *
Stunnel4 Ubuntu upstream *
Stunnel4 Ubuntu xenial *

Potential Mitigations

References