Medium severity5.9NVD Advisory· Published Jan 20, 2017· Updated May 13, 2026
CVE-2014-9754
CVE-2014-9754
Description
The hardware VPN client in Viprinet MultichannelVPN Router 300 version 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint's SSL key) before initiating the exchange, which allows an attacker to perform a Man in the Middle attack.
Affected products
2cpe:2.3:o:viprinet:multichannel_vpn_router_300_firmware:2013070830:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:viprinet:multichannel_vpn_router_300_firmware:2013070830:*:*:*:*:*:*:*
- cpe:2.3:o:viprinet:multichannel_vpn_router_300_firmware:2013080900:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- packetstormsecurity.com/files/135614/Viprinet-Multichannel-VPN-Router-300-Identity-Verification-Fail.htmlnvdThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2016/Feb/8nvdMailing ListThird Party Advisory
- www.securityfocus.com/archive/1/537441/100/0/threadednvd
News mentions
0No linked articles in our index yet.