CVE-2025-12106

Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
OpenVPNCNA
---
---
CISA-ADPADP
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
Debian logo
Debian Releases
Debian Product
Codename
openvpn
bullseye
2.5.1-3
fixed
bullseye (security)
2.5.1-3+deb11u2
fixed
bookworm
2.6.3-1+deb12u3
fixed
bookworm (security)
2.6.3-1+deb12u4
fixed
trixie
2.6.14-1
fixed
trixie (security)
2.6.14-1+deb13u1
fixed
forky
2.7.0~rc3-1
fixed
sid
2.7.0~rc3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openvpn
questing
not-affected
plucky
not-affected
noble
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected