CVE-2025-13086

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
UNKNOWN
---
OpenVPNCNA
---
---
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Debian logo
Debian Releases
Debian Product
Codename
openvpn
bullseye
2.5.1-3
not-affected
bullseye (security)
2.5.1-3+deb11u2
fixed
bookworm
vulnerable
bookworm (security)
2.6.3-1+deb12u4
fixed
trixie
vulnerable
trixie (security)
2.6.14-1+deb13u1
fixed
forky
2.7.0~rc3-1
fixed
sid
2.7.0~rc3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openvpn
questing
Fixed 2.6.14-2ubuntu1.1
released
plucky
Fixed 2.6.14-0ubuntu0.25.04.3
released
noble
Fixed 2.6.14-0ubuntu0.24.04.3
released
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
needs-triage