Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification.
This attack requires * Attacker knows the ICE password. * Only take place during PeerConnection handshake.
This attack can be detected by monitoring PeerConnectionState
in all versions of Pion WebRTC.
Users should upgrade to v3.0.15.
The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
Users should listen for when PeerConnectionState
changes to PeerConnectionStateFailed
. When it enters this state users should not continue using the PeerConnection.
If you have any questions or comments about this advisory: * Open an issue in https://github.com/pion/webrtc * Email us at team@pion.ly
Thank you to https://github.com/Gaukas for discovering this.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-863" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-05-21T21:29:41Z" }