Vulnerability CVE-2021-28681


Published: 2021-03-18

Description:
Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)

Type:

CWE-863

(Incorrect Authorization)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Webrtc project -> Webrtc 

 References:
https://github.com/pion/webrtc/issues/1708
https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p

Copyright 2024, cxsecurity.com

 

Back to Top