Search CVE reports


Toggle filters

1 – 10 of 53 results


CVE-2026-40215

Medium priority
Needs evaluation

race condition in TLS handshake that could lead to leaking of packet data from a previous handshake under specific circumstances

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2026-35058

Medium priority
Needs evaluation

server ASSERT() on receiving a suitably malformed packet with a valid tls-crypt-v2 key

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-15497

Medium priority
Not affected

Insufficient epoch key slot processing in OpenVPN 2.7_alpha1 through 2.7_rc5 allows remote authenticated users to trigger an assert resulting in a denial of service

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-12106

Medium priority
Not affected

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-13086

Medium priority
Fixed

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in...

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Fixed Not affected Not affected Not affected
Show less packages

CVE-2025-10680

Medium priority
Not affected

OpenVPN 2.7_alpha1 through 2.7_beta1 on POSIX based platforms allows a remote authenticated server to inject shell commands via DNS variables when --dns-updown is in use

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-3908

Medium priority
Needs evaluation

The configuration initialization tool in OpenVPN 3 Linux v20 through v24 on Linux allows a local attacker to use symlinks pointing at an arbitrary directory which will change the ownership and permissions of that destination directory.

1 affected package

openvpn3-client

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn3-client Not in release Not in release Not in release
Show less packages

CVE-2024-4877

Medium priority
Not affected

OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-2704

Medium priority
Fixed

OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Fixed Not affected Not affected Not affected
Show less packages

CVE-2024-1305

Medium priority
Ignored

tap-windows6 driver version 9.26 and earlier does not properly check the size data of incomming write operations which an attacker can use to overflow memory buffers, resulting in a bug check and potentially arbitrary code...

1 affected package

openvpn

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openvpn Not affected Not affected Not affected Not affected
Show less packages