CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2006-2229

First published: Fri May 05 2006(Updated: )

OpenVPN 2.0.7 and earlier, when configured to use the --management option with an IP that is not 127.0.0.1, uses a cleartext password for TCP sessions to the management interface, which might allow remote attackers to view sensitive information or cause a denial of service.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
OpenVPN Monitor=2.0_beta13
OpenVPN Monitor=2.0_rc9
OpenVPN Monitor=2.0_test19
OpenVPN Monitor=2.0
OpenVPN Monitor=2.0_test17
OpenVPN Monitor=2.0_test10
OpenVPN Monitor=2.0_test23
OpenVPN Monitor=2.0_beta20
OpenVPN Monitor=2.0.1_rc3
OpenVPN Monitor=2.0_beta19
OpenVPN Monitor=2.0_rc19
OpenVPN Monitor=2.0_beta1
OpenVPN Monitor=2.0.4
OpenVPN Monitor=2.0_rc21
OpenVPN Monitor=2.0_beta9
OpenVPN Monitor=2.0.1_rc4
OpenVPN Monitor=2.0.1_rc2
OpenVPN Monitor=2.0_test26
OpenVPN Monitor=2.0_rc2
OpenVPN Monitor=2.0_test1
OpenVPN Monitor=2.0_beta16
OpenVPN Monitor=2.0_beta10
OpenVPN Monitor=2.0_rc20
OpenVPN Monitor=2.0_test14
OpenVPN Monitor=2.0_test6
OpenVPN Monitor=2.0_test12
OpenVPN Monitor=2.0.2_rc1
OpenVPN Monitor=2.0_rc3
OpenVPN Monitor=2.0.3_rc1
OpenVPN Monitor=2.0_beta15
OpenVPN Monitor=2.0_rc12
OpenVPN Monitor=2.0_beta8
OpenVPN Monitor=2.0_test3
OpenVPN Monitor=2.0_beta5
OpenVPN Monitor=2.0_beta18
OpenVPN Monitor=2.0_rc5
OpenVPN Monitor=2.0_rc6
OpenVPN Monitor=2.0.6_rc1
OpenVPN Monitor=2.0_rc11
OpenVPN Monitor=2.0_rc7
OpenVPN Monitor=2.0_rc4
OpenVPN Monitor=2.0_beta2
OpenVPN Monitor=2.0_rc16
OpenVPN Monitor=2.0_test29
OpenVPN Monitor=2.0_beta3
OpenVPN Monitor=2.0_test9
OpenVPN Monitor=2.0_test27
OpenVPN Monitor=2.0_test25
OpenVPN Monitor=2.0_test21
OpenVPN Monitor=2.0_beta28
OpenVPN Monitor=2.0_rc17
OpenVPN Monitor=2.0_test5
OpenVPN Monitor=2.0_test20
OpenVPN Monitor=2.0_rc10
OpenVPN Monitor=2.0_rc8
OpenVPN Monitor=2.0.1_rc1
OpenVPN Monitor=2.0_test22
OpenVPN Monitor=2.0_test11
OpenVPN Monitor=2.0_test24
OpenVPN Monitor=2.0.1_rc6
OpenVPN Monitor=2.0_test7
OpenVPN Monitor=2.0.1_rc7
OpenVPN Monitor=2.0_rc14
OpenVPN Monitor=2.0_test4
OpenVPN Monitor=2.0_rc18
OpenVPN Monitor=2.0_beta17
OpenVPN Monitor=2.0_test15
OpenVPN Monitor=2.0_test8
OpenVPN Monitor=2.0_rc1
OpenVPN Monitor=2.0.1_rc5
OpenVPN Monitor=2.0_beta4
OpenVPN Monitor=2.0_test2
OpenVPN Monitor=2.0_beta6
OpenVPN Monitor=2.0_rc15
OpenVPN Monitor=2.0_beta7
OpenVPN Monitor=2.0_beta11
OpenVPN Monitor=2.0_test18
OpenVPN Monitor=2.0_test16
OpenVPN Monitor=2.0_rc13
OpenVPN Monitor=2.0_beta12
OpenVPN Access Server=2.0.1
OpenVPN Access Server=2.0.2
OpenVPN Access Server=2.0.5
OpenVPN Access Server=2.0.6
OpenVPN Access Server=2.0.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2006-2229?

    CVE-2006-2229 is considered a moderate severity vulnerability that could lead to sensitive information disclosure or denial of service.

  • How do I fix CVE-2006-2229?

    To fix CVE-2006-2229, configure OpenVPN's management interface to listen only on localhost by using the 127.0.0.1 address.

  • What software versions are affected by CVE-2006-2229?

    CVE-2006-2229 affects OpenVPN versions 2.0.7 and earlier, including various beta, release candidate, and test versions.

  • What can attackers do with CVE-2006-2229?

    Attackers can exploit CVE-2006-2229 to gain access to cleartext passwords used in TCP sessions to the management interface.

  • Is CVE-2006-2229 widely exploited?

    While there may not be reports of widespread exploitation of CVE-2006-2229, the vulnerability poses a risk to systems that have misconfigured management access.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203