Description
SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5.2.5188 and earlier, a pre-authentication denial-of-service vulnerability exists in SoftEther VPN Developer Edition 5.2.5188 (and likely earlier versions of Developer Edition). An unauthenticated remote attacker can crash the vpnserver process by sending a single malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.
Published: 2026-04-07
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from a flaw in the handling of EAP‑TLS packets in SoftEther VPN Developer Edition 5.2.5188 and earlier. A single malformed EAP‑TLS packet received over the L2TP protocol can trigger a crash of the vpnserver process, immediately terminating all active VPN sessions. The defect is a resource denial weakness, under CWE‑789, and results in a denial‑of‑service condition that disrupts connectivity for all users connected to the affected server.

Affected Systems

Affected products are SoftEtherVPN Server, specifically the Developer Edition version 5.2.5188 and earlier releases. The issue affects deployments that enable L2TP over UDP on port 1701 and do not restrict unauthenticated EAP‑TLS traffic. No other SoftEther product versions or branches are listed as impacted.

Risk and Exploitability

The CVSS v3.1 score of 7.5 indicates a high severity risk, while the EPSS score of less than 1% suggests a low likelihood of current exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, implying it may not yet have been observed in widespread attacks. An attacker can reach the target remotely from any network that can reach port 1701; no local access or elevated privileges are required. Successful exploitation would cause an abrupt service halt, impacting availability for all client connections.

Generated by OpenCVE AI on April 14, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to SoftEtherVPN Developer Edition 5.2.5189 or later
  • If an upgrade is not immediately possible, disable or block L2TP (UDP/1701) traffic to the vpnserver until a patch is applied
  • Verify that no active VPN clients are connected before applying updates to prevent sudden disconnections

Generated by OpenCVE AI on April 14, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Softether
Softether softethervpn
CPEs cpe:2.3:a:softether:softethervpn:*:*:*:*:developer:*:*:*
Vendors & Products Softether
Softether softethervpn

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Softethervpn
Softethervpn softethervpn
Vendors & Products Softethervpn
Softethervpn softethervpn

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5.2.5188 and earlier, a pre-authentication denial-of-service vulnerability exists in SoftEther VPN Developer Edition 5.2.5188 (and likely earlier versions of Developer Edition). An unauthenticated remote attacker can crash the vpnserver process by sending a single malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.
Title Pre-Auth EAP-TLS DoS on SoftEther VPN Developer Edition
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Softether Softethervpn
Softethervpn Softethervpn
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T17:27:16.498Z

Reserved: 2026-04-06T19:31:07.265Z

Link: CVE-2026-39312

cve-icon Vulnrichment

Updated: 2026-04-07T17:27:08.391Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T17:16:36.920

Modified: 2026-04-14T20:08:38.900

Link: CVE-2026-39312

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:30:09Z

Weaknesses