CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
4Description
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Analysis
Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
Technical Context
A denial of service vulnerability allows an attacker to disrupt the normal functioning of a system, making it unavailable to legitimate users.
Affected Products
Affected products: Openvpn Openvpn
Remediation
Implement rate limiting and input validation. Use timeout mechanisms for resource-intensive operations. Deploy DDoS protection where applicable.
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| noble | released | 2.6.14-0ubuntu0.24.04.3 |
| plucky | released | 2.6.14-0ubuntu0.25.04.3 |
| questing | released | 2.6.14-2ubuntu1.1 |
| trusty | not-affected | code not present |
| bionic | not-affected | - |
| focal | not-affected | - |
| jammy | not-affected | 2.5.11-0ubuntu0.22.04.1 |
| upstream | released | 2.7.0,2.6.16,2.7.0~rc2-2 |
| xenial | not-affected | - |
Debian
Bug #1121086| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | not-affected | - | - |
| bullseye (security) | fixed | 2.5.1-3+deb11u2 | - |
| bookworm, bookworm (security) | fixed | 2.6.3-1+deb12u4 | - |
| trixie (security), trixie | fixed | 2.6.14-1+deb13u1 | - |
| forky, sid | fixed | 2.7.0-1 | - |
| experimental | fixed | 2.7.0~rc2-1 | - |
| bookworm | fixed | 2.6.3-1+deb12u4 | - |
| trixie | fixed | 2.6.14-1+deb13u1 | - |
| (unstable) | fixed | 2.7.0~rc2-2 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-201102