First published: Mon Jan 06 2025(Updated: )
Last updated 9 April 2025
Credit: security@openvpn.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openvpn | <=2.5.1-3<=2.6.3-1+deb12u2 | 2.5.1-3+deb11u1 2.6.14-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5594 is considered a high-severity vulnerability due to its potential for arbitrary code execution through improper sanitation of PUSH_REPLY messages.
To fix CVE-2024-5594, upgrade your OpenVPN version to at least 2.6.12-1 to ensure proper sanitization of PUSH_REPLY messages.
OpenVPN versions before 2.6.11, including versions up to 2.5.1-3 and 2.6.3-1+deb12u2, are affected by CVE-2024-5594.
Exploitation of CVE-2024-5594 could allow attackers to inject unexpected and potentially malicious data into third-party executables or plug-ins.
As of now, no public exploits for CVE-2024-5594 have been widely reported, but the vulnerability poses a significant risk given its characteristics.