First published: Mon Jul 08 2024(Updated: )
OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVPN Monitor | <2.5.10 | |
OpenVPN Monitor | >=2.6.0<2.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27903 has a high severity rating as it allows an attacker to load arbitrary plug-ins with potential exploitation of the OpenVPN interactive service.
To fix CVE-2024-27903, update OpenVPN to version 2.6.10 or later to mitigate the vulnerability.
OpenVPN versions 2.6.0 to 2.6.9 and all versions before 2.5.10 are affected by CVE-2024-27903.
Exploiting CVE-2024-27903 can allow attackers to execute arbitrary code within the context of the OpenVPN service, leading to unauthorized access or control.
A temporary workaround for CVE-2024-27903 is to restrict the loading of plugins to specific, trusted directories until an update can be applied.