CRZ-005

OpenVPN-AS version fingerprint

info CVSS 3.1: · Asset: vpn.corezoid.com

Summary

vpn.corezoid.com is identified as OpenVPN Access Server via Server: OpenVPN-AS response header. OpenVPN AS has had several critical CVEs:

Per the engagement RoE, VPN endpoint is fingerprint-only — no auth brute-forcing, no exploitation. Version disclosure is the only data point collected.

Reproduction

$ curl -skI https://vpn.corezoid.com/ | grep -i server
Server: OpenVPN-AS

The landing page responds with 403 Forbidden (auth required), which is correct behavior. No version string is directly disclosed in the header.

Additional probing needed (fingerprint-only)

Impact

Unknown until version is determined. If version is < 2.13.0, the server is vulnerable to CVE-2023-46850 (memory disclosure, potentially credential leakage).

Remediation

  1. Keep OpenVPN-AS patched to the latest release.
  2. Consider hiding the Server: header at the upstream reverse proxy if one is in front.
  3. Require client certs in addition to passwords (mutual TLS) for the portal.

References