handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{
"cwe_ids": [
"CWE-287"
],
"nvd_published_at": null,
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-05-25T19:54:18Z"
}