Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openvpn
(Openvpn)Repositories | https://github.com/OpenVPN/openvpn |
#Vulnerabilities | 37 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-11-11 | CVE-2023-46849 | Using the --fragment option in certain configuration setups OpenVPN version 2.6.0 to 2.6.6 allows an attacker to trigger a divide by zero behaviour which could cause an application crash, leading to a denial of service. | Debian_linux, Fedora, Openvpn, Openvpn_access_server | 7.5 | ||
2024-07-08 | CVE-2024-28882 | OpenVPN from 2.6.0 through 2.6.10 in a server role accepts multiple exit notifications from authenticated clients which will extend the validity of a closing session | Openvpn | N/A | ||
2025-01-06 | CVE-2024-5594 | OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs. | Openvpn | N/A | ||
2025-04-02 | CVE-2025-2704 | OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase | Openvpn | N/A | ||
2025-04-03 | CVE-2024-4877 | OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges | Openvpn | N/A | ||
2021-04-26 | CVE-2020-15078 | OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks. | Ubuntu_linux, Debian_linux, Fedora, Openvpn | 7.5 |