Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0985 Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
Github GHSA Github GHSA GHSA-74xm-qj29-cq8p In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T21:47:33.209Z

Reserved: 2021-03-18T00:00:00

Link: CVE-2021-28681

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-18T04:15:14.617

Modified: 2024-11-21T06:00:07.237

Link: CVE-2021-28681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses