Vulnerabilites related to openvpn - connect
CVE-2023-7245 (GCVE-0-2023-7245)
Vulnerability from cvelistv5
Published
2024-02-20 11:08
Modified
2024-08-14 14:36
CWE
  • CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Summary
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
Impacted products
Vendor Product Version
OpenVPN OpenVPN Connect Version: 3.0 (Windows)
Version: 3.0 (macOS)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.027Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "release-notes",
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
          },
          {
            "tags": [
              "release-notes",
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "connect",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThan": "3.4.7",
                "status": "affected",
                "version": "3.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "connect",
            "vendor": "openvpn",
            "versions": [
              {
                "lessThan": "3.4.3",
                "status": "affected",
                "version": "3.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-7245",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T20:35:31.784407Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T14:36:15.335Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS"
          ],
          "product": "OpenVPN Connect",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "3.4.3",
              "status": "affected",
              "version": "3.0 (Windows)",
              "versionType": "minor releases"
            },
            {
              "lessThanOrEqual": "3.4.7",
              "status": "affected",
              "version": "3.0 (macOS) ",
              "versionType": "minor releases"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-95",
              "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T11:08:29.089Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
        },
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2023-7245",
    "datePublished": "2024-02-20T11:08:29.089Z",
    "dateReserved": "2024-02-07T13:25:05.853Z",
    "dateUpdated": "2024-08-14T14:36:15.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-8474 (GCVE-0-2024-8474)
Vulnerability from cvelistv5
Published
2025-01-06 14:33
Modified
2025-01-06 16:54
CWE
  • CWE-212 - Improper Removal of Sensitive Information Before Storage or Transfer
Summary
OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-8474",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T16:53:43.249831Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T16:54:38.487Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Android"
          ],
          "product": "OpenVPN Connect",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "3.5.0",
              "status": "affected",
              "version": "0",
              "versionType": "all releases"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect before version 3.5.0 can contain the configuration profile\u0027s clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-212",
              "description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T14:33:26.129Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "release-notes"
          ],
          "url": "https://openvpn.net/connect-docs/android-release-notes.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2024-8474",
    "datePublished": "2025-01-06T14:33:26.129Z",
    "dateReserved": "2024-09-05T08:38:27.571Z",
    "dateUpdated": "2025-01-06T16:54:38.487Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3761 (GCVE-0-2022-3761)
Vulnerability from cvelistv5
Published
2023-10-17 12:10
Modified
2024-08-03 01:20
Severity ?
CWE
  • CWE-295 - Improper Certificate Validation
Summary
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials
Impacted products
Vendor Product Version
OpenVPN Inc OpenVPN Connect Version: until 3.4.0.4506
Version: until 3.4.0.3100
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:20:57.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "MacOS"
          ],
          "product": "OpenVPN Connect",
          "vendor": "OpenVPN Inc",
          "versions": [
            {
              "lessThan": "3.4.0.4506",
              "status": "affected",
              "version": "until 3.4.0.4506",
              "versionType": "macOS"
            },
            {
              "lessThan": "3.4.0.3100",
              "status": "affected",
              "version": "until 3.4.0.3100",
              "versionType": "Windows"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T12:10:36.100Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
        },
        {
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2022-3761",
    "datePublished": "2023-10-17T12:10:36.100Z",
    "dateReserved": "2022-10-31T07:38:29.762Z",
    "dateUpdated": "2024-08-03T01:20:57.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-9442 (GCVE-0-2020-9442)
Vulnerability from cvelistv5
Published
2020-02-28 13:40
Modified
2024-08-04 10:26
Severity ?
CWE
  • n/a
Summary
OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:26:16.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/hessandrew/CVE-2020-9442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\\OpenVPN Connect\\drivers\\tap\\amd64\\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-28T13:40:41",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/hessandrew/CVE-2020-9442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-9442",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\\OpenVPN Connect\\drivers\\tap\\amd64\\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/hessandrew/CVE-2020-9442",
              "refsource": "MISC",
              "url": "https://github.com/hessandrew/CVE-2020-9442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-9442",
    "datePublished": "2020-02-28T13:40:41",
    "dateReserved": "2020-02-28T00:00:00",
    "dateUpdated": "2024-08-04T10:26:16.103Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-15075 (GCVE-0-2020-15075)
Vulnerability from cvelistv5
Published
2021-03-30 13:38
Modified
2024-08-04 13:08
Severity ?
CWE
  • CWE-61 - UNIX Symbolic Link (Symlink) Following
Summary
OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp.
Impacted products
Vendor Product Version
n/a OpenVPN Connect Version: 3.2.6 and prior versions
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:08:21.419Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN Connect",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.6 and prior versions"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-61",
              "description": "CWE-61: UNIX Symbolic Link (Symlink) Following",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-30T13:38:02",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2020-15075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN Connect",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.2.6 and prior versions"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-61: UNIX Symbolic Link (Symlink) Following"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/",
              "refsource": "MISC",
              "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2020-15075",
    "datePublished": "2021-03-30T13:38:02",
    "dateReserved": "2020-06-25T00:00:00",
    "dateUpdated": "2024-08-04T13:08:21.419Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-7224 (GCVE-0-2023-7224)
Vulnerability from cvelistv5
Published
2024-01-08 13:55
Modified
2024-09-04 19:13
CWE
  • CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Summary
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.118Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-7224",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-13T19:35:01.249201Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-04T19:13:07.440Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "macOS"
          ],
          "product": "OpenVPN Connect",
          "vendor": "OpenVPN",
          "versions": [
            {
              "lessThanOrEqual": "3.4.6",
              "status": "affected",
              "version": "3.0",
              "versionType": "minor release"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-95",
              "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-08T13:55:20.160Z",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2023-7224",
    "datePublished": "2024-01-08T13:55:20.160Z",
    "dateReserved": "2024-01-08T12:17:14.800Z",
    "dateUpdated": "2024-09-04T19:13:07.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3613 (GCVE-0-2021-3613)
Vulnerability from cvelistv5
Published
2021-07-02 12:33
Modified
2024-08-03 17:01
Severity ?
CWE
  • CWE-427 - Uncontrolled Search Path Element
Summary
OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).
Impacted products
Vendor Product Version
n/a OpenVPN Connect Version: 3.2.0 up to 3.3.0
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.446Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OpenVPN Connect",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.0 up to 3.3.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-02T12:33:36",
        "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
        "shortName": "OpenVPN"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@openvpn.net",
          "ID": "CVE-2021-3613",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OpenVPN Connect",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.2.0 up to 3.3.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-427 Uncontrolled Search Path Element"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/",
              "refsource": "MISC",
              "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e",
    "assignerShortName": "OpenVPN",
    "cveId": "CVE-2021-3613",
    "datePublished": "2021-07-02T12:33:36",
    "dateReserved": "2021-06-22T00:00:00",
    "dateUpdated": "2024-08-03T17:01:07.446Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-07-02 13:15
Modified
2024-11-21 06:21
Summary
OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).
Impacted products
Vendor Product Version
openvpn connect *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "28A1683D-7915-44EC-BBE5-78E10AFE9E8A",
              "versionEndIncluding": "3.3.0",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe)."
    },
    {
      "lang": "es",
      "value": "OpenVPN Connect versiones 3.2.0 hasta 3.3.0, permite a usuarios locales cargar bibliotecas din\u00e1micas arbitrarias por medio de un archivo de configuraci\u00f3n de OpenSSL si est\u00e1 presente, permitiendo a un usuario ejecutar c\u00f3digo arbitrario con el mismo nivel de privilegio que el proceso principal de OpenVPN (OpenVPNConnect.exe)"
    }
  ],
  "id": "CVE-2021-3613",
  "lastModified": "2024-11-21T06:21:58.937",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-07-02T13:15:08.037",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-01-08 14:15
Modified
2024-11-21 08:45
Summary
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
Impacted products
Vendor Product Version
openvpn connect *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "E933ACE1-DCEF-4AE5-AF74-075DD0E38ACC",
              "versionEndIncluding": "3.4.6",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable"
    },
    {
      "lang": "es",
      "value": "OpenVPN Connect versi\u00f3n 3.0 a 3.4.6 en macOS permite a los usuarios locales ejecutar c\u00f3digo en librer\u00edas externas de terceros utilizando la variable de entorno DYLD_INSERT_LIBRARIES"
    }
  ],
  "id": "CVE-2023-7224",
  "lastModified": "2024-11-21T08:45:33.277",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-01-08T14:15:47.130",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-95"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-03-30 14:15
Modified
2024-11-21 05:04
Summary
OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp.
Impacted products
Vendor Product Version
openvpn connect *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "92A7CF12-1670-4A8E-B674-9856D54094E3",
              "versionEndIncluding": "3.2.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp."
    },
    {
      "lang": "es",
      "value": "El instalador de OpenVPN Connect para macOS versi\u00f3n 3.2.6 y anteriores, puede corromper archivos cr\u00edticos del sistema a los que no deber\u00eda tener acceso por medio de enlaces simb\u00f3licos en /tmp."
    }
  ],
  "id": "CVE-2020-15075",
  "lastModified": "2024-11-21T05:04:45.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-30T14:15:13.450",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-61"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 13:15
Modified
2024-11-21 07:20
Summary
OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials
Impacted products
Vendor Product Version
openvpn connect *
openvpn connect *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "54A4FF64-4693-4196-87F8-F25728A1D9E4",
              "versionEndExcluding": "3.4.0.3121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "70DC57A0-4862-443C-AC95-5EEED057B719",
              "versionEndExcluding": "3.4.0.4506",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect versions before 3.4.0.4506 (macOS) and OpenVPN Connect before 3.4.0.3100 (Windows) allows man-in-the-middle attackers to intercept configuration profile download requests which contains the users credentials"
    },
    {
      "lang": "es",
      "value": "Las versiones de OpenVPN Connect anteriores a 3.4.0.4506 (macOS) y OpenVPN Connect anteriores a 3.4.0.3100 (Windows) permiten a atacantes intermediarios interceptar solicitudes de descarga de perfiles de configuraci\u00f3n que contienen las credenciales de los usuarios."
    }
  ],
  "id": "CVE-2022-3761",
  "lastModified": "2024-11-21T07:20:11.653",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T13:15:11.573",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-01-06 15:15
Modified
2025-06-10 16:31
Summary
OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic
Impacted products
Vendor Product Version
openvpn connect *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "3C5CCC69-B938-4CCE-98B3-0B8064C987F1",
              "versionEndExcluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect before version 3.5.0 can contain the configuration profile\u0027s clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic"
    },
    {
      "lang": "es",
      "value": "OpenVPN Connect anterior a la versi\u00f3n 3.5.0 puede contener la clave privada en texto plano del perfil de configuraci\u00f3n que se registra en el registro de la aplicaci\u00f3n, que un actor no autorizado puede usar para descifrar el tr\u00e1fico VPN."
    }
  ],
  "id": "CVE-2024-8474",
  "lastModified": "2025-06-10T16:31:24.740",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-06T15:15:14.983",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/connect-docs/android-release-notes.html"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-212"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-28 14:15
Modified
2024-11-21 05:40
Summary
OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there.
Impacted products
Vendor Product Version
openvpn connect *
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDD09B49-84B0-4AEE-BC18-100748A3D494",
              "versionEndIncluding": "3.1.0.361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\\OpenVPN Connect\\drivers\\tap\\amd64\\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there."
    },
    {
      "lang": "es",
      "value": "OpenVPN Connect versi\u00f3n 3.1.0.361 sobre Windows,  presenta  Permisos No Seguros para %PROGRAMDATA%\\OpenVPN Connect\\drivers\\tap\\amd64\\win10, lo que permite a usuarios locales alcanzar privilegios al copiar una biblioteca drvstore.dll maliciosa."
    }
  ],
  "id": "CVE-2020-9442",
  "lastModified": "2024-11-21T05:40:39.050",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-28T14:15:10.327",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/hessandrew/CVE-2020-9442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/hessandrew/CVE-2020-9442"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 11:15
Modified
2025-04-02 20:11
Summary
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
Impacted products
Vendor Product Version
openvpn connect *
openvpn connect *
openvpn connect 3.0.0
openvpn connect 3.0.0
openvpn connect 3.0.1
openvpn connect 3.0.2
openvpn connect 3.1.0
openvpn connect 3.1.0
openvpn connect 3.1.1
openvpn connect 3.1.1
openvpn connect 3.1.2
openvpn connect 3.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*",
              "matchCriteriaId": "5E925C3F-979A-4F99-ACA7-92D66CB4B236",
              "versionEndExcluding": "3.4.4",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:*:*:*:*:*:macos:*:*",
              "matchCriteriaId": "E6B3687D-9465-4486-989B-601EB674D3E2",
              "versionEndExcluding": "3.4.8",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.0.0:beta:*:*:*:macos:*:*",
              "matchCriteriaId": "3196F94E-6D6D-4CDE-BB92-792E6600193A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.0.0:beta:*:*:*:windows:*:*",
              "matchCriteriaId": "13E51A0D-2CC1-4562-B21B-EFA0935A1DA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.0.1:beta:*:*:*:macos:*:*",
              "matchCriteriaId": "5A2048FB-0D80-4529-A038-83C84E145254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.0.2:beta:*:*:*:macos:*:*",
              "matchCriteriaId": "D709FABE-D787-49BD-A14C-00F874697CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.0:beta:*:*:*:macos:*:*",
              "matchCriteriaId": "0FC77EE5-9747-4C31-BEC5-DDBE0F3E1EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.0:beta:*:*:*:windows:*:*",
              "matchCriteriaId": "FD7E340B-3742-48EA-80F9-5FE85F43B399",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.1:beta:*:*:*:macos:*:*",
              "matchCriteriaId": "968D9CCD-6A21-4BE5-9A49-7814589EEBFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.1:beta:*:*:*:windows:*:*",
              "matchCriteriaId": "F8EF6606-E8D5-4BDD-B11A-1A09EAC57F9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.2:beta:*:*:*:windows:*:*",
              "matchCriteriaId": "69E27D71-3DEE-4CEF-AF98-DF1CF4C2B8A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openvpn:connect:3.1.3:beta:*:*:*:windows:*:*",
              "matchCriteriaId": "B48D986D-099D-42B5-A94E-32B4EFE97784",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable\n"
    },
    {
      "lang": "es",
      "value": "El framework nodejs en OpenVPN Connect 3.0 a 3.4.3 (Windows)/3.4.7 (macOS) no se configur\u00f3 correctamente, lo que permite a un usuario local ejecutar c\u00f3digo arbitrario dentro del contexto del proceso nodejs a trav\u00e9s de la variable de entorno ELECTRON_RUN_AS_NODE"
    }
  ],
  "id": "CVE-2023-7245",
  "lastModified": "2025-04-02T20:11:54.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-20T11:15:07.750",
  "references": [
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "security@openvpn.net",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"
    }
  ],
  "sourceIdentifier": "security@openvpn.net",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-95"
        }
      ],
      "source": "security@openvpn.net",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}