CVE-2023-31192
SoftEther VPN Server vulnerability analysis and mitigation

Overview

An information disclosure vulnerability (CVE-2023-31192) exists in the ClientConnect() functionality of SoftEther VPN 5.01.9674. The vulnerability allows a specially crafted network packet to lead to disclosure of sensitive information through a man-in-the-middle attack. The issue was discovered by Lilith of Cisco Talos and was publicly disclosed on October 12, 2023, with a CVSS v3.1 base score of 5.3 (Medium) (Talos Report, NVD).

Technical details

The vulnerability exists in the ClientConnect() functionality when handling redirection responses for the clustering (load balancing) feature. When the VPN Client connects to an untrusted VPN Server, an invalid redirection response can cause 20 bytes of uninitialized stack space to be read. The issue occurs because if the redirection response packet doesn't contain a Ticket value, the UCHAR ticket[20] variable remains uninitialized, and its contents are then sent to the destination VPN Server during the connection process (SoftEther Advisory).

Impact

The vulnerability allows an attacker to obtain the contents of an uninitialized 20-byte variable from the VPN Client. While the contents of uninitialized variables are typically unpredictable and may not contain useful information, there is a theoretical possibility that fragments of confidential information (such as authentication information or heap memory addresses) could accidentally overlap with the 20-byte area, potentially exposing sensitive data to the attacker (SoftEther Advisory).

Mitigation and workarounds

The vulnerability was patched in the release of SoftEther VPN 4.42 Build 9798 RTM on June 30, 2023. The fix implements proper initialization of the variable to prevent the disclosure of uninitialized stack memory (SoftEther Advisory).

Additional resources


SourceThis report was generated using AI

Related SoftEther VPN Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-25568CRITICAL9.8
  • SoftEther VPN ServerSoftEther VPN Server
  • cpe:2.3:a:softether:vpn
NoNoMar 12, 2025
CVE-2025-25567CRITICAL9.8
  • SoftEther VPN ServerSoftEther VPN Server
  • cpe:2.3:a:softether:vpn
NoNoMar 12, 2025
CVE-2025-25565CRITICAL9.8
  • SoftEther VPN ServerSoftEther VPN Server
  • cpe:2.3:a:softether:vpn
NoNoMar 12, 2025
CVE-2025-25566MEDIUM5.6
  • SoftEther VPN ServerSoftEther VPN Server
  • cpe:2.3:a:softether:vpn
NoNoMar 12, 2025
CVE-2024-38520MEDIUM5.3
  • SoftEther VPN ServerSoftEther VPN Server
  • cpe:2.3:a:softether:vpn
NoNoJun 26, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management