Vulnerabilities (CVE)

Filtered by vendor Openvpn Subscribe
Total 67 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-13751 2 Microsoft, Openvpn 2 Windows, Openvpn 2026-01-30 N/A 5.5 MEDIUM
Interactive service agent in OpenVPN version 2.5.0 through 2.6.16 and 2.7_alpha1 through 2.7_rc2 on Windows allows a local authenticated user to connect to the service and trigger an error causing a local denial of service.
CVE-2025-13086 1 Openvpn 1 Openvpn 2026-01-30 N/A 7.5 HIGH
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
CVE-2025-12106 1 Openvpn 1 Openvpn 2025-12-30 N/A 9.1 CRITICAL
Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
CVE-2024-5594 1 Openvpn 1 Openvpn 2025-11-03 N/A 9.1 CRITICAL
OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.
CVE-2022-0547 3 Debian, Fedoraproject, Openvpn 3 Debian Linux, Fedora, Openvpn 2025-11-03 7.5 HIGH 9.8 CRITICAL
OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
CVE-2025-2704 1 Openvpn 1 Openvpn 2025-10-23 N/A 7.5 HIGH
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
CVE-2024-13454 1 Openvpn 1 Easy-rsa 2025-08-22 N/A 5.3 MEDIUM
Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3
CVE-2024-1305 1 Openvpn 1 Tap-windows6 2025-08-22 N/A 9.8 CRITICAL
tap-windows6 driver version 9.26 and earlier does not properly check the size data of incomming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code execution in kernel space
CVE-2025-50054 1 Openvpn 1 Ovpn-dco-win 2025-08-21 N/A 5.5 MEDIUM
Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash
CVE-2023-6247 1 Openvpn 1 Openvpn 3 2025-08-21 N/A 6.5 MEDIUM
The PKCS#7 parser in OpenVPN 3 Core Library versions through 3.8.3 did not properly validate the parsed data, which would result in the application crashing.
CVE-2025-3908 2 Linux, Openvpn 2 Linux Kernel, Openvpn3linux 2025-06-12 N/A 6.2 MEDIUM
The configuration initialization tool in OpenVPN 3 Linux v20 through v24 on Linux allows a local attacker to use symlinks pointing at an arbitrary directory which will change the ownership and permissions of that destination directory.
CVE-2023-46849 3 Debian, Fedoraproject, Openvpn 4 Debian Linux, Fedora, Openvpn and 1 more 2025-06-11 N/A 7.5 HIGH
Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service.
CVE-2024-8474 1 Openvpn 1 Connect 2025-06-10 N/A 7.5 HIGH
OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic
CVE-2024-28882 1 Openvpn 1 Openvpn 2025-06-10 N/A 4.3 MEDIUM
OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session
CVE-2024-5198 1 Openvpn 1 Ovpn-dco-win 2025-06-10 N/A 3.3 LOW
OpenVPN ovpn-dco for Windows version 1.1.1 allows an unprivileged local attacker to send I/O control messages with invalid data to the driver resulting in a NULL pointer dereference leading to a system halt.
CVE-2023-7235 1 Openvpn 1 Openvpn Gui 2025-05-06 N/A 8.4 HIGH
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
CVE-2024-4877 2 Microsoft, Openvpn 2 Windows, Openvpn 2025-04-29 N/A 8.8 HIGH
OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges
CVE-2017-7521 1 Openvpn 1 Openvpn 2025-04-20 4.3 MEDIUM 5.9 MEDIUM
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
CVE-2017-7508 1 Openvpn 1 Openvpn 2025-04-20 5.0 MEDIUM 7.5 HIGH
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
CVE-2017-7522 1 Openvpn 1 Openvpn 2025-04-20 4.0 MEDIUM 6.5 MEDIUM
OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.