Логотип exploitDog
product: "openvpn"
Консоль
Логотип exploitDog

exploitDog

product: "openvpn"

Количество 186

Количество 186

github логотип

GHSA-757r-jmm6-p24p

около 3 лет назад

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-6mpq-5wjj-48jg

почти 2 года назад

Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6crj-vqv7-qq9r

около 3 лет назад

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-63q4-8wcf-wg8f

12 месяцев назад

OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-5gwv-2q72-gxrm

3 месяца назад

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3wwj-66cm-595v

около 3 лет назад

OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3c2r-pvhv-53p8

около 3 лет назад

OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).

EPSS: Низкий
github логотип

GHSA-2w3j-7x55-5cx2

около 3 лет назад

The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-2cgw-c87g-ww8q

около 3 лет назад

OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.

CVSS3: 7.4
EPSS: Низкий
ubuntu логотип

CVE-2025-2704

3 месяца назад

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-2704

3 месяца назад

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-2704

3 месяца назад

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-5594

5 месяцев назад

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2024-5594

5 месяцев назад

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2024-5594

5 месяцев назад

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly wh ...

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2024-4877

3 месяца назад

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2024-4877

3 месяца назад

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, le ...

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2024-28882

12 месяцев назад

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2024-28882

12 месяцев назад

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2024-28882

12 месяцев назад

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple ex ...

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-757r-jmm6-p24p

OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.

CVSS3: 7.4
1%
Низкий
около 3 лет назад
github логотип
GHSA-6mpq-5wjj-48jg

Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.

CVSS3: 7.5
1%
Низкий
почти 2 года назад
github логотип
GHSA-6crj-vqv7-qq9r

An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.

CVSS3: 3.7
2%
Низкий
около 3 лет назад
github логотип
GHSA-63q4-8wcf-wg8f

OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.

CVSS3: 7.2
7%
Низкий
12 месяцев назад
github логотип
GHSA-5gwv-2q72-gxrm

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-3wwj-66cm-595v

OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.

CVSS3: 7.5
3%
Низкий
около 3 лет назад
github логотип
GHSA-3c2r-pvhv-53p8

OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).

0%
Низкий
около 3 лет назад
github логотип
GHSA-2w3j-7x55-5cx2

The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.

CVSS3: 9.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-2cgw-c87g-ww8q

OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration.

CVSS3: 7.4
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2025-2704

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-2704

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

CVSS3: 7.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-2704

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 ...

CVSS3: 7.5
0%
Низкий
3 месяца назад
ubuntu логотип
CVE-2024-5594

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

CVSS3: 9.1
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-5594

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

CVSS3: 9.1
0%
Низкий
5 месяцев назад
debian логотип
CVE-2024-5594

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly wh ...

CVSS3: 9.1
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2024-4877

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

CVSS3: 8.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2024-4877

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, le ...

CVSS3: 8.8
0%
Низкий
3 месяца назад
ubuntu логотип
CVE-2024-28882

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
1%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-28882

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session

CVSS3: 4.3
1%
Низкий
12 месяцев назад
debian логотип
CVE-2024-28882

OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple ex ...

CVSS3: 4.3
1%
Низкий
12 месяцев назад

Уязвимостей на страницу