Intel

AIKIDO-2025-10404

OpenVPN.openvpn is vulnerable to Improper Validation of Specified Type of Input

Improper Validation of Specified Type of InputCVE-2024-5594

24

Low Risk

This Affects:

c++OpenVPN.openvpn
2.5.0 - 2.5.10
Fixed in 2.5.11
2.6.0 - 2.6.11
Fixed in 2.6.12

TL;DR

Affected versions of OpenVPN prior to 2.6.11 do not properly sanitize PUSH_REPLY messages, allowing a malicious server to inject unexpected and arbitrary data that may be written to client logs.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

OpenVPN.openvpn is vulnerable to Improper Validation of Specified Type of Input in versions 2.5.0 - 2.5.10 and 2.6.0 - 2.6.11.

How to fix this

Upgrade the OpenVPN.openvpn library to the patch version.

Background Info