9.1

CVE-2025-12106

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenvpnOpenvpn Version2.6.13 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatealpha1 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatealpha2 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatealpha3 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatebeta1 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatebeta2 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updatebeta3 SwEditioncommunity
OpenvpnOpenvpn Version2.7 Updaterc1 SwEditioncommunity
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.241
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CWE-126 Buffer Over-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.