Heap Buffer Over-Read Vulnerability in OpenVPN by OpenVPN Technologies
CVE-2025-12106

9.1CRITICAL

Key Information:

Vendor

Openvpn

Status
Vendor
CVE Published:
1 December 2025

What is CVE-2025-12106?

CVE-2025-12106 is a heap buffer over-read vulnerability affecting OpenVPN, a widely used open-source VPN solution that enables secure point-to-point or site-to-site connections. This vulnerability arises from insufficient argument validation in versions 2.7_alpha1 through 2.7_rc1, specifically while parsing IP addresses. Attackers could exploit this flaw to read beyond the allocated memory buffer, potentially exposing sensitive data or causing unexpected behavior in the software. Given the critical role of OpenVPN in establishing secure communications, this vulnerability poses significant risks to organizations leveraging its capabilities for remote work and secure connectivity.

Potential Impact of CVE-2025-12106

  1. Data Exposure: Exploiting this vulnerability could lead to unauthorized access to sensitive information within the memory of the application, exposing private data to attackers who can then use it for malicious purposes.

  2. Service Disruption: The buffer over-read could result in instability within the OpenVPN service, potentially leading to service outages or degraded performance, affecting business operations that rely on secure connections.

  3. Increased Attack Surface: The existence of this vulnerability in a widely utilized software product raises the risk of targeted attacks, particularly from cybercriminals looking to exploit unpatched systems within organizations, potentially paving the way for further malicious actions.

Affected Version(s)

OpenVPN 2.7_alpha1 <= 2.7_rc1

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.