PT-2025-43608 · Openvpn Technologies · Openvpn

Published

2025-10-18

·

Updated

2025-12-04

·

CVE-2025-10680

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions OpenVPN versions 2.7 alpha1 through 2.7 beta1
Description The OpenVPN software, specifically the --dns-updown component, is susceptible to a flaw that allows a remote authenticated server to inject shell commands via DNS variables when the --dns-updown option is enabled. This issue arises from a failure to neutralize special elements when processing the --dns and --dhcp-option arguments. Exploitation of this issue could allow an attacker to execute arbitrary code. Approximately 3.3 million to 3.6 million devices are estimated to be potentially affected worldwide. The issue can be exploited by malicious VPN servers pushing crafted --dns or --dhcp-option parameters to the --dns-updown hook, leading to command injection on Unix clients (Linux/macOS). The vulnerability affects systems connecting to untrusted VPN services.
Recommendations Update to version 2.7 beta2 or later to address this vulnerability.

Fix

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2025-13551
CVE-2025-10680

Affected Products

Openvpn