handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{
    "severity": "CRITICAL",
    "github_reviewed_at": "2021-05-25T19:54:18Z",
    "cwe_ids": [
        "CWE-287"
    ],
    "github_reviewed": true,
    "nvd_published_at": null
}