CVE-2025-43711

| EUVD-2025-20098 HIGH
2025-07-05 [email protected]
8.1
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 06:34 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
7.0
Analysis Generated
Mar 16, 2026 - 03:19 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 03:19 euvd
EUVD-2025-20098
CVE Published
Jul 05, 2025 - 00:15 nvd
HIGH 8.1

DescriptionNVD

Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the next boot) by dragging a crafted Tunnelblick.app file into /Applications.

AnalysisAI

A remote code execution vulnerability (CVSS 8.1) that allows attackers. High severity vulnerability requiring prompt remediation.

Technical ContextAI

Vulnerability type: remote code execution. CVSS 8.1 indicates high severity.

RemediationAI

Monitor vendor channels for patch availability.

Share

CVE-2025-43711 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy