CVE-2024-8474
- EPSS 0.25%
- Veröffentlicht 06.01.2025 15:15:14
- Zuletzt bearbeitet 10.06.2025 16:31:24
OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic
CVE-2023-7245
- EPSS 0.19%
- Veröffentlicht 20.02.2024 11:15:07
- Zuletzt bearbeitet 02.04.2025 20:11:54
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
CVE-2023-7224
- EPSS 0.11%
- Veröffentlicht 08.01.2024 14:15:47
- Zuletzt bearbeitet 21.11.2024 08:45:33
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
CVE-2022-3761
- EPSS 0.11%
- Veröffentlicht 17.10.2023 13:15:11
- Zuletzt bearbeitet 21.11.2024 07:20:11
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials
CVE-2021-3613
- EPSS 0.13%
- Veröffentlicht 02.07.2021 13:15:08
- Zuletzt bearbeitet 21.11.2024 06:21:58
OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (O...
CVE-2020-15075
- EPSS 0.14%
- Veröffentlicht 30.03.2021 14:15:13
- Zuletzt bearbeitet 21.11.2024 05:04:45
OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp.
CVE-2020-9442
- EPSS 2.05%
- Veröffentlicht 28.02.2020 14:15:10
- Zuletzt bearbeitet 21.11.2024 05:40:39
OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there.