handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{ "nvd_published_at": null, "github_reviewed_at": "2021-05-25T19:54:18Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-287" ] }