Cyber Posture

CVE-2024-5594

Critical

Published: 06 January 2025

Published
06 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0028 51.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.

Security Summary

CVE-2024-5594 is a vulnerability in OpenVPN versions prior to 2.6.11 that stems from improper sanitization of PUSH_REPLY messages. An attacker controlling the OpenVPN server can exploit this flaw to inject unexpected arbitrary data, which ends up in the client logs. The issue is classified under CWE-1287 (Improper Validation of Specified Quantity in Input) and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to high impacts on confidentiality and integrity.

The attack requires an adversary to control the OpenVPN server, with no privileges, user interaction, or special conditions needed beyond network access. Exploitation allows the injection of arbitrary data into client-side logs, potentially enabling log poisoning, exposure of sensitive information through crafted payloads, or disruption of log integrity for forensic analysis.

Advisories recommend upgrading to OpenVPN 2.6.11 or later to mitigate the vulnerability, as detailed in the official OpenVPN wiki at https://community.openvpn.net/openvpn/wiki/CVE-2024-5594. Additional guidance appears in the OpenVPN users mailing list at https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html and Debian LTS announcement at https://lists.debian.org/debian-lts-announce/2025/03/msg00005.html, which cover patched packages for affected distributions.

Details

CWE(s)
CWE-1287

Affected Products

openvpn
openvpn
2.6.0 — 2.6.11

References