Openvpn

Openvpn

42 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 03.12.2025 19:54:10
  • Zuletzt bearbeitet 04.12.2025 17:15:08

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client

  • EPSS 0.01%
  • Veröffentlicht 03.12.2025 16:22:35
  • Zuletzt bearbeitet 04.12.2025 17:15:08

Interactive service agent in OpenVPN version 2.5.0 through 2.7_rc2 on Windows allows a local authenticated user to connect to the service and trigger an error causing a local denial of service.

  • EPSS 0.07%
  • Veröffentlicht 01.12.2025 12:43:02
  • Zuletzt bearbeitet 01.12.2025 19:15:49

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

  • EPSS 0.16%
  • Veröffentlicht 24.10.2025 10:15:34
  • Zuletzt bearbeitet 27.10.2025 13:20:15

OpenVPN 2.7_alpha1 through 2.7_beta1 on POSIX based platforms allows a remote authenticated server to inject shell commands via DNS variables when --dns-updown is in use

  • EPSS 0.15%
  • Veröffentlicht 03.04.2025 16:15:32
  • Zuletzt bearbeitet 29.04.2025 19:45:07

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

  • EPSS 0.17%
  • Veröffentlicht 02.04.2025 21:15:32
  • Zuletzt bearbeitet 23.10.2025 11:15:31

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

  • EPSS 0.28%
  • Veröffentlicht 06.01.2025 14:15:08
  • Zuletzt bearbeitet 03.11.2025 21:18:47

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

  • EPSS 0.32%
  • Veröffentlicht 08.07.2024 22:15:02
  • Zuletzt bearbeitet 10.06.2025 16:26:09

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

  • EPSS 5.42%
  • Veröffentlicht 08.07.2024 11:15:10
  • Zuletzt bearbeitet 21.11.2024 09:04:39

The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.

  • EPSS 11.09%
  • Veröffentlicht 08.07.2024 11:15:10
  • Zuletzt bearbeitet 21.11.2024 09:00:04

The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.