### [CVE-2021-3547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3547) ![](https://img.shields.io/static/v1?label=Product&message=OpenVPN%203%20Core%20Library&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.6%20and%203.6.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&color=brightgreen) ### Description OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration. ### POC #### Reference - https://community.openvpn.net/openvpn/wiki/CVE-2021-3547 #### Github No PoCs found on GitHub currently.