Vulnerability Description
The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvpn | Connect | >= 3.2.0, < 3.4.4 |
Related Weaknesses (CWE)
References
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/Release Notes
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/Release Notes
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/Release Notes
- https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/Release Notes
FAQ
What is CVE-2023-7245?
CVE-2023-7245 is a vulnerability with a CVSS score of 7.8 (HIGH). The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via...
How severe is CVE-2023-7245?
CVE-2023-7245 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-7245?
Check the references section above for vendor advisories and patch information. Affected products include: Openvpn Connect.