CVE-2024-5594Improper Validation of Specified Type of Input in Openvpn

Severity
9.1CRITICALNVD
OSV9.8OSV4.3
EPSS
0.3%
top 48.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 6
Latest updateMar 13

Description

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

Affected Packages5 packages

debiandebian/openvpn< openvpn 2.6.3-1+deb12u3 (bookworm)
CVEListV5openvpn/openvpn< 2.6.11
NVDopenvpn/openvpn2.6.02.6.11
Debianopenvpn/openvpn< 2.5.1-3+deb11u1+3
Ubuntuopenvpn/openvpn< 2.4.12-0ubuntu0.20.04.2+5

🔴Vulnerability Details

4
OSV
openvpn vulnerabilities2025-03-11
OSV
CVE-2024-5594: OpenVPN before 22025-01-06
GHSA
GHSA-f2h8-4w6p-535w: OpenVPN before 22025-01-06
OSV
openvpn vulnerabilities2024-07-02

📋Vendor Advisories

5
CISA ICS
Siemens SINEMA Remote Connect Server2025-03-13
Ubuntu
OpenVPN vulnerabilities2025-03-11
CISA ICS
Siemens SCALANCE M-800 Family2024-11-14
Ubuntu
OpenVPN vulnerabilities2024-07-02
Debian
CVE-2024-5594: openvpn - OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an att...2024