PT-2025-43608 · Openvpn Technologies · Openvpn
Published
2025-10-18
·
Updated
2025-12-04
·
CVE-2025-10680
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
OpenVPN versions 2.7 alpha1 through 2.7 beta1
Description
The OpenVPN software, specifically the --dns-updown component, is susceptible to a flaw that allows a remote authenticated server to inject shell commands via DNS variables when the --dns-updown option is enabled. This issue arises from a failure to neutralize special elements when processing the --dns and --dhcp-option arguments. Exploitation of this issue could allow an attacker to execute arbitrary code. Approximately 3.3 million to 3.6 million devices are estimated to be potentially affected worldwide. The issue can be exploited by malicious VPN servers pushing crafted --dns or --dhcp-option parameters to the --dns-updown hook, leading to command injection on Unix clients (Linux/macOS). The vulnerability affects systems connecting to untrusted VPN services.
Recommendations
Update to version 2.7 beta2 or later to address this vulnerability.
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-13551
CVE-2025-10680
Affected Products
Openvpn
References · 27
- https://cve.org/CVERecord?id=CVE-2025-10680 · Security Note
- https://bdu.fstec.ru/vul/2025-13551 · Security Note
- https://community.openvpn.net/Security%20Announcements/CVE-2025-10680 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-10680 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-10680 · Security Note
- https://ubuntu.com/security/CVE-2025-10680 · Vendor Advisory
- https://reddit.com/r/CVEWatch/comments/1okqilw/top_10_trending_cves_31102025 · Reddit Post
- https://mail-archive.com/openvpn-announce@lists.sourceforge.net/msg00149.html · Note
- https://reddit.com/r/CVEWatch/comments/1ojcukl/top_10_trending_cves_29102025 · Reddit Post
- https://twitter.com/pHo9UBenaA/status/1983136455753888195 · Twitter Post
- https://twitter.com/fofabot/status/1983378710096163274 · Twitter Post
- https://t.me/cveNotify/140141 · Telegram Post
- https://twitter.com/Komodosec/status/1996611094673236261 · Twitter Post
- https://t.me/CVEtracker/35662 · Telegram Post
- https://reddit.com/r/CVEWatch/comments/1ojvl49/top_10_trending_cves_30102025 · Reddit Post