SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)
SoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.
SoftEtherVPN is an open-source, cross-platform, multi-protocol VPN program. A pre-authentication denial-of-service vulnerability, identified as CVE-2026-39312, affects SoftEther VPN Developer Edition 5.2.5188 and likely earlier versions. Disclosed on April 7, 2026, this vulnerability allows an unauthenticated remote attacker to crash the vpnserver process, effectively terminating all active VPN sessions. The attack vector involves sending a single malformed EAP-TLS packet over raw L2TP, specifically UDP port 1701. Exploitation of this vulnerability requires no prior authentication, making it easily exploitable and posing a significant risk to organizations relying on SoftEtherVPN for secure remote access. The impact can range from temporary service disruption to complete VPN infrastructure unavailability.
Attack Chain
- An unauthenticated attacker identifies a vulnerable SoftEtherVPN server (version 5.2.5188 or earlier) exposed over UDP port 1701.
- The attacker crafts a malformed EAP-TLS packet.
- The attacker sends the crafted EAP-TLS packet over raw L2TP (UDP/1701) to the target VPN server.
- The SoftEtherVPN server receives the malformed packet.
- Due to the vulnerability, the
vpnserverprocess attempts to process the malformed packet. - The processing of the malformed packet triggers a memory allocation issue (CWE-789), causing the
vpnserverprocess to crash. - All active VPN sessions are terminated abruptly as the
vpnserverprocess is no longer running. - Legitimate users are disconnected and unable to establish new VPN connections, resulting in a denial-of-service condition.
Impact
Successful exploitation of CVE-2026-39312 results in a denial-of-service condition, disrupting VPN services and preventing legitimate users from accessing internal resources. The vulnerability allows an unauthenticated attacker to remotely crash the VPN server, potentially impacting any organization using SoftEtherVPN for remote access. The impact is a complete outage of VPN services until the vpnserver process is manually restarted, leading to potential loss of productivity and business disruption.
Recommendation
- Upgrade SoftEtherVPN to a version later than 5.2.5188 to patch CVE-2026-39312.
- Monitor network traffic for unusual or malformed EAP-TLS packets on UDP port 1701, using the “Detect SoftEtherVPN Malformed EAP-TLS Packet” Sigma rule.
- Implement rate limiting on UDP port 1701 to mitigate the impact of a potential denial-of-service attack.
Detection coverage 2
Detect SoftEtherVPN Malformed EAP-TLS Packet
mediumDetects potentially malformed EAP-TLS packets sent to SoftEtherVPN servers over UDP/1701, which could indicate a denial-of-service attempt.
Detect SoftEtherVPN Server Process Crash
highDetects a sudden termination of the SoftEtherVPN server process, which could be a result of CVE-2026-39312 exploitation.
Detection queries are kept inside the platform. Get full rules →