CVE-2024-38520

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38520
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38520.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38520
Aliases
  • GHSA-j35p-p8pj-vqxq
Published
2024-06-26T18:59:25.088Z
Modified
2025-12-05T05:08:20.771610Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
SoftEther VPN with L2TP - 2.75x Amplification
Details

SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. When SoftEtherVPN is deployed with L2TP enabled on a device, it introduces the possibility of the host being used for amplification/reflection traffic generation because it will respond to every packet with two response packets that are larger than the request packet size. These sorts of techniques are used by external actors who generate spoofed source IPs to target a destination on the internet. This vulnerability has been patched in version 5.02.5185.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-400"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38520.json"
}
References

Affected packages

Git / github.com/softethervpn/softethervpn

Affected ranges

Type
GIT
Repo
https://github.com/softethervpn/softethervpn
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

5.*

5.01.9658
5.01.9659
5.01.9660
5.01.9661
5.01.9662
5.01.9663
5.01.9664
5.01.9665
5.01.9666
5.01.9667
5.01.9668
5.01.9669
5.01.9670
5.01.9671
5.01.9672
5.01.9673
5.01.9674
5.02.0
5.02.5180
5.02.5181
5.02.5182
5.02.5183
5.02.5184