Vulnerabilites related to openvpn - openvpn_gui
Vulnerability from fkie_nvd
Published
2024-02-21 11:15
Modified
2025-05-06 18:02
Severity ?
Summary
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
References
▶ | URL | Tags | |
---|---|---|---|
security@openvpn.net | https://community.openvpn.net/openvpn/wiki/CVE-2023-7235 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://community.openvpn.net/openvpn/wiki/CVE-2023-7235 | Permissions Required |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openvpn | openvpn_gui | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openvpn:openvpn_gui:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A9F8F53-6588-455E-A07F-2BEF428EAD88", "versionEndExcluding": "2.6.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables." }, { "lang": "es", "value": "El instalador de la GUI de OpenVPN anterior a la versi\u00f3n 2.6.9 no establec\u00eda las restricciones de control de acceso adecuadas al directorio de instalaci\u00f3n de los archivos binarios de OpenVPN cuando usaba una ruta de instalaci\u00f3n no est\u00e1ndar, lo que permite a un atacante reemplazar archivos binarios para ejecutar ejecutables arbitrarios." } ], "id": "CVE-2023-7235", "lastModified": "2025-05-06T18:02:59.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-02-21T11:15:07.673", "references": [ { "source": "security@openvpn.net", "tags": [ "Permissions Required" ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235" } ], "sourceIdentifier": "security@openvpn.net", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "security@openvpn.net", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2023-7235 (GCVE-0-2023-7235)
Vulnerability from cvelistv5
Published
2024-02-21 10:55
Modified
2024-08-26 16:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "openvpn", "vendor": "openvpn", "versions": [ { "lessThanOrEqual": "2.6.8", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-7235", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-26T16:50:36.232236Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T16:13:36.611Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "OpenVPN", "vendor": "OpenVPN", "versions": [ { "lessThanOrEqual": "2.6.8", "status": "affected", "version": "0", "versionType": "all releases" } ] } ], "descriptions": [ { "lang": "en", "value": "The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276: Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-21T10:55:15.487Z", "orgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "shortName": "OpenVPN" }, "references": [ { "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-7235" } ] } }, "cveMetadata": { "assignerOrgId": "36a55730-e66d-4d39-8ca6-3c3b3017965e", "assignerShortName": "OpenVPN", "cveId": "CVE-2023-7235", "datePublished": "2024-02-21T10:55:15.487Z", "dateReserved": "2024-01-16T15:21:16.217Z", "dateUpdated": "2024-08-26T16:13:36.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }