CVE-2018-4058

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-4058
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-4058.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-4058
Downstream
Published
2019-03-21T16:00:54Z
Modified
2025-08-09T19:01:28Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An exploitable unsafe default configuration vulnerability exists in the TURN server functionality of coTURN prior to 4.5.0.9. By default, the TURN server allows relaying external traffic to the loopback interface of its own host. This can provide access to other private services running on that host, which can lead to further attacks. An attacker can set up a relay with a loopback address as the peer on an affected TURN server to trigger this vulnerability.

References

Affected packages