CVE-2014-9754 (multichannel_vpn_router_300_firmware)

CVE-2014-9754 (multichannel_vpn_router_300_firmware)

The hardware VPN client in Viprinet MultichannelVPN Router 300 verison 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint’s SSL key) before initiating the exchange, which allows an attacker to perform a Man in the Middle attack.

Source: CVE-2014-9754 (multichannel_vpn_router_300_firmware)

CVE-2014-9755 (multichannel_vpn_router_300_firmware)

CVE-2014-9755 (multichannel_vpn_router_300_firmware)

The hardware VPN client in Viprinet MultichannelVPN Router 300 verison 2013070830/2013080900 does not validate the remote VPN endpoint identity (through the checking of the endpoint’s SSL key) before initiating the exchange, which allows remote attackers to perform a replay attack.

Source: CVE-2014-9755 (multichannel_vpn_router_300_firmware)

CVE-2014-2045

CVE-2014-2045

Multiple cross-site scripting (XSS) vulnerabilities in the ‘old’ and ‘new’ interfaces in Viprinet Multichannel VPN Router 300 allow remote attackers to inject arbitrary web script or HTML via the username when (1) logging in or (2) creating an account in old interface, (3) username when creating an account in the new interface, (4) hostname in the old interface, (5) inspect parameter in the config module, (6) commands parameter in the atcommands tool, or (7) host parameter in the ping tool.

Source: CVE-2014-2045