tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 22 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Openvpn
Openvpn tap-windows6
CPEs cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:*
Vendors & Products Openvpn
Openvpn tap-windows6

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04282}

epss

{'score': 0.04395}


cve-icon MITRE

Status: PUBLISHED

Assigner: OpenVPN

Published:

Updated: 2024-08-23T03:55:36.778Z

Reserved: 2024-02-07T13:22:25.493Z

Link: CVE-2024-1305

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.379Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-08T18:15:07.150

Modified: 2025-08-22T15:36:38.907

Link: CVE-2024-1305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.