Vulnerability Description
OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvpn | Connect | >= 3.2.0, <= 3.3.0 |
Related Weaknesses (CWE)
References
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/Release NotesVendor Advisory
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/Release NotesVendor Advisory
FAQ
What is CVE-2021-3613?
CVE-2021-3613 is a vulnerability with a CVSS score of 7.8 (HIGH). OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the s...
How severe is CVE-2021-3613?
CVE-2021-3613 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3613?
Check the references section above for vendor advisories and patch information. Affected products include: Openvpn Connect.