Vulnerabilites related to OpenVPN - OpenVPN Connect
CVE-2023-7224 (GCVE-0-2023-7224)
Vulnerability from cvelistv5
Published
2024-01-08 13:55
Modified
2024-09-04 19:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Summary
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenVPN | OpenVPN Connect |
Version: 3.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-7224", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-13T19:35:01.249201Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:13:07.440Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "macOS" ], "product": "OpenVPN Connect", "vendor": "OpenVPN", "versions": [ { "lessThanOrEqual": "3.4.6", "status": "affected", "version": "3.0", "versionType": "minor release" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-08T13:55:20.160Z", "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "shortName": "OpenVPN" }, "references": [ { "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/" } ] } }, "cveMetadata": { "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "assignerShortName": "OpenVPN", "cveId": "CVE-2023-7224", "datePublished": "2024-01-08T13:55:20.160Z", "dateReserved": "2024-01-08T12:17:14.800Z", "dateUpdated": "2024-09-04T19:13:07.440Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-8474 (GCVE-0-2024-8474)
Vulnerability from cvelistv5
Published
2025-01-06 14:33
Modified
2025-01-06 16:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Summary
OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenVPN | OpenVPN Connect |
Version: 0 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-8474", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-06T16:53:43.249831Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-06T16:54:38.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Android" ], "product": "OpenVPN Connect", "vendor": "OpenVPN", "versions": [ { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "0", "versionType": "all releases" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenVPN Connect before version 3.5.0 can contain the configuration profile\u0027s clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-06T14:33:26.129Z", "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "shortName": "OpenVPN" }, "references": [ { "tags": [ "release-notes" ], "url": "https://openvpn.net/connect-docs/android-release-notes.html" } ] } }, "cveMetadata": { "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "assignerShortName": "OpenVPN", "cveId": "CVE-2024-8474", "datePublished": "2025-01-06T14:33:26.129Z", "dateReserved": "2024-09-05T08:38:27.571Z", "dateUpdated": "2025-01-06T16:54:38.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-7245 (GCVE-0-2023-7245)
Vulnerability from cvelistv5
Published
2024-02-20 11:08
Modified
2024-08-14 14:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Summary
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
OpenVPN | OpenVPN Connect |
Version: 3.0 (Windows) Version: 3.0 (macOS) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "release-notes", "x_transferred" ], "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "connect", "vendor": "openvpn", "versions": [ { "lessThan": "3.4.7", "status": "affected", "version": "3.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "connect", "vendor": "openvpn", "versions": [ { "lessThan": "3.4.3", "status": "affected", "version": "3.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-7245", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T20:35:31.784407Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-14T14:36:15.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows", "MacOS" ], "product": "OpenVPN Connect", "vendor": "OpenVPN", "versions": [ { "lessThanOrEqual": "3.4.3", "status": "affected", "version": "3.0 (Windows)", "versionType": "minor releases" }, { "lessThanOrEqual": "3.4.7", "status": "affected", "version": "3.0 (macOS) ", "versionType": "minor releases" } ] } ], "descriptions": [ { "lang": "en", "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-20T11:08:29.089Z", "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "shortName": "OpenVPN" }, "references": [ { "tags": [ "release-notes" ], "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/" }, { "tags": [ "release-notes" ], "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "assignerShortName": "OpenVPN", "cveId": "CVE-2023-7245", "datePublished": "2024-02-20T11:08:29.089Z", "dateReserved": "2024-02-07T13:25:05.853Z", "dateUpdated": "2024-08-14T14:36:15.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }