Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.)
References
Link | Resource |
---|---|
https://github.com/pion/webrtc/issues/1708 | Exploit Patch Third Party Advisory |
https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p | Third Party Advisory |
Configurations
Information
Published : 2021-03-17 21:15
Updated : 2021-03-25 06:45
NVD link : CVE-2021-28681
Mitre link : CVE-2021-28681
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
webrtc_project
- webrtc