← Back to CVEs
CVE-2018-4059
CRITICAL9.8
Description
An exploitable unsafe default configuration vulnerability exists in the TURN server function of coTURN prior to version 4.5.0.9. By default, the TURN server runs an unauthenticated telnet admin portal on the loopback interface. This can provide administrator access to the TURN server configuration, which can lead to additional attacks. An attacker who can get access to the telnet port can gain administrator access to the TURN server.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/21/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
coturn_project:coturn
Weaknesses (CWE)
CWE-862
References
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0733(talos-cna@cisco.com)
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0733(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.