5.9
CVSSv3

CVE-2016-6329

Published: 31/01/2017 Updated: 09/07/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 388
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

OpenVPN, when using a 64-bit block cipher, makes it easier for remote malicious users to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openvpn openvpn

Vendor Advisories

Several security issues were fixed in OpenVPN ...
Ciphers with 64-bit block sizes used in CBC mode were found to be vulnerable to a birthday attack when key renegotiation doesn't happen frequently or at all in long running connections The blowfish cipher as used in OpenVPN by default is vulnerable to this attack, allowing a remote attacker to recover partial plaintext information (XOR of two plai ...