CVE Vulnerabilities

CVE-2022-0547

Authentication Bypass by Primary Weakness

Published: Mar 18, 2022 | Modified: Nov 03, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.

Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Affected Software

NameVendorStart VersionEnd Version
OpenvpnOpenvpn2.1.0 (including)2.4.12 (excluding)
OpenvpnOpenvpn2.5.0 (including)2.5.6 (excluding)
OpenvpnUbuntubionic*
OpenvpnUbuntudevel*
OpenvpnUbuntuesm-infra-legacy/trusty*
OpenvpnUbuntuesm-infra/bionic*
OpenvpnUbuntuesm-infra/focal*
OpenvpnUbuntuesm-infra/xenial*
OpenvpnUbuntufocal*
OpenvpnUbuntuimpish*
OpenvpnUbuntujammy*
OpenvpnUbuntukinetic*
OpenvpnUbuntulunar*
OpenvpnUbuntumantic*
OpenvpnUbuntunoble*
OpenvpnUbuntutrusty*
OpenvpnUbuntutrusty/esm*
OpenvpnUbuntuupstream*
OpenvpnUbuntuxenial*

References