diff --git a/advisories/unreviewed/2025/01/GHSA-rc52-2qp6-xmff/GHSA-rc52-2qp6-xmff.json b/advisories/unreviewed/2025/01/GHSA-rc52-2qp6-xmff/GHSA-rc52-2qp6-xmff.json new file mode 100644 index 0000000000000..288d52c734008 --- /dev/null +++ b/advisories/unreviewed/2025/01/GHSA-rc52-2qp6-xmff/GHSA-rc52-2qp6-xmff.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rc52-2qp6-xmff", + "modified": "2025-01-20T21:30:33Z", + "published": "2025-01-20T21:30:32Z", + "aliases": [ + "CVE-2024-13454" + ], + "details": "Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13454" + }, + { + "type": "WEB", + "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-13454" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2025-01-20T21:15:21Z" + } +} \ No newline at end of file