EUVD-2025-199988

| CVE-2025-12106 CRITICAL
2025-12-01 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 13:34 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 13:34 euvd
EUVD-2025-199988
CVE Published
Dec 01, 2025 - 13:16 nvd
CRITICAL 9.1

Description

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

Analysis

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses

Technical Context

This vulnerability is classified as Buffer Over-read (CWE-126).

Affected Products

Affected products: Openvpn Openvpn 2.6.13

Remediation

Monitor vendor advisories for patches. Apply mitigations such as network segmentation, access restrictions, and monitoring.

Priority Score

46
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +46
POC: 0

Vendor Status

Ubuntu

Priority: Medium
openvpn
Release Status Version
trusty not-affected code not present
xenial not-affected code not present
bionic not-affected code not present
focal not-affected code not present
jammy not-affected code not present
noble not-affected code not present
plucky not-affected code not present
questing not-affected code not present
upstream not-affected debian: Vulnerable code only in 2.7 upstream

Debian

openvpn
Release Status Fixed Version Urgency
bullseye fixed 2.5.1-3 -
bullseye (security) fixed 2.5.1-3+deb11u2 -
bookworm, bookworm (security) fixed 2.6.3-1+deb12u4 -
trixie (security), trixie fixed 2.6.14-1+deb13u1 -
forky, sid fixed 2.7.0-1 -
(unstable) not-affected - -

Share

EUVD-2025-199988 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy