OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 24 May 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Openvpn
Openvpn openvpn
CPEs cpe:2.3:a:openvpn:openvpn:*:*:*:*:community:*:*:*
Vendors & Products Openvpn
Openvpn openvpn

Mon, 07 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Apr 2025 02:45:00 +0000

Type Values Removed Values Added
References

Wed, 02 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Description OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Weaknesses CWE-754
References

cve-icon MITRE

Status: PUBLISHED

Assigner: OpenVPN

Published:

Updated: 2025-04-07T17:23:59.009Z

Reserved: 2025-03-24T10:26:42.493Z

Link: CVE-2025-2704

cve-icon Vulnrichment

Updated: 2025-04-03T00:11:05.289Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-02T21:15:32.943

Modified: 2025-05-24T01:38:01.433

Link: CVE-2025-2704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.