<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Softethervpn — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/softethervpn/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 17:16:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/softethervpn/feed.xml" rel="self" type="application/rss+xml"/><item><title>SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)</title><link>https://feed.craftedsignal.io/briefs/2026-04-softether-dos/</link><pubDate>Tue, 07 Apr 2026 17:16:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-softether-dos/</guid><description>SoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.</description><content:encoded><![CDATA[<p>SoftEtherVPN is an open-source, cross-platform, multi-protocol VPN program. A pre-authentication denial-of-service vulnerability, identified as CVE-2026-39312, affects SoftEther VPN Developer Edition 5.2.5188 and likely earlier versions. Disclosed on April 7, 2026, this vulnerability allows an unauthenticated remote attacker to crash the <code>vpnserver</code> process, effectively terminating all active VPN sessions. The attack vector involves sending a single malformed EAP-TLS packet over raw L2TP, specifically UDP port 1701. Exploitation of this vulnerability requires no prior authentication, making it easily exploitable and posing a significant risk to organizations relying on SoftEtherVPN for secure remote access. The impact can range from temporary service disruption to complete VPN infrastructure unavailability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable SoftEtherVPN server (version 5.2.5188 or earlier) exposed over UDP port 1701.</li>
<li>The attacker crafts a malformed EAP-TLS packet.</li>
<li>The attacker sends the crafted EAP-TLS packet over raw L2TP (UDP/1701) to the target VPN server.</li>
<li>The SoftEtherVPN server receives the malformed packet.</li>
<li>Due to the vulnerability, the <code>vpnserver</code> process attempts to process the malformed packet.</li>
<li>The processing of the malformed packet triggers a memory allocation issue (CWE-789), causing the <code>vpnserver</code> process to crash.</li>
<li>All active VPN sessions are terminated abruptly as the <code>vpnserver</code> process is no longer running.</li>
<li>Legitimate users are disconnected and unable to establish new VPN connections, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39312 results in a denial-of-service condition, disrupting VPN services and preventing legitimate users from accessing internal resources. The vulnerability allows an unauthenticated attacker to remotely crash the VPN server, potentially impacting any organization using SoftEtherVPN for remote access. The impact is a complete outage of VPN services until the <code>vpnserver</code> process is manually restarted, leading to potential loss of productivity and business disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SoftEtherVPN to a version later than 5.2.5188 to patch CVE-2026-39312.</li>
<li>Monitor network traffic for unusual or malformed EAP-TLS packets on UDP port 1701, using the &ldquo;Detect SoftEtherVPN Malformed EAP-TLS Packet&rdquo; Sigma rule.</li>
<li>Implement rate limiting on UDP port 1701 to mitigate the impact of a potential denial-of-service attack.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dos</category><category>softethervpn</category><category>cve-2026-39312</category><category>l2tp</category></item></channel></rss>