CVE-2025-13086
- EPSS 0.05%
- Veröffentlicht 03.12.2025 19:54:10
- Zuletzt bearbeitet 04.12.2025 17:15:08
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
CVE-2025-13751
- EPSS 0.01%
- Veröffentlicht 03.12.2025 16:22:35
- Zuletzt bearbeitet 04.12.2025 17:15:08
Interactive service agent in OpenVPN version 2.5.0 through 2.7_rc2 on Windows allows a local authenticated user to connect to the service and trigger an error causing a local denial of service.
CVE-2025-12106
- EPSS 0.07%
- Veröffentlicht 01.12.2025 12:43:02
- Zuletzt bearbeitet 01.12.2025 19:15:49
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
CVE-2025-10680
- EPSS 0.16%
- Veröffentlicht 24.10.2025 10:15:34
- Zuletzt bearbeitet 27.10.2025 13:20:15
OpenVPN 2.7_alpha1 through 2.7_beta1 on POSIX based platforms allows a remote authenticated server to inject shell commands via DNS variables when --dns-updown is in use
CVE-2024-4877
- EPSS 0.15%
- Veröffentlicht 03.04.2025 16:15:32
- Zuletzt bearbeitet 29.04.2025 19:45:07
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
CVE-2025-2704
- EPSS 0.17%
- Veröffentlicht 02.04.2025 21:15:32
- Zuletzt bearbeitet 23.10.2025 11:15:31
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
CVE-2024-5594
- EPSS 0.28%
- Veröffentlicht 06.01.2025 14:15:08
- Zuletzt bearbeitet 03.11.2025 21:18:47
OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
CVE-2024-28882
- EPSS 0.32%
- Veröffentlicht 08.07.2024 22:15:02
- Zuletzt bearbeitet 10.06.2025 16:26:09
OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
CVE-2024-27459
- EPSS 5.42%
- Veröffentlicht 08.07.2024 11:15:10
- Zuletzt bearbeitet 21.11.2024 09:04:39
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
CVE-2024-24974
- EPSS 11.09%
- Veröffentlicht 08.07.2024 11:15:10
- Zuletzt bearbeitet 21.11.2024 09:00:04
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.