While the current vulnerability primarily causes server crashes, security experts warn that denial of service attacks can create opportunities for additional exploitation attempts, including potential paths to remote code execution in complex network environments. Historical context shows that OpenVPN has previously addressed more severe vulnerabilities, including CVE-2017-7521, which was a critical remote code execution bug that could drain server memory and potentially lead to code execution. A critical security vulnerability in OpenVPN has been discovered that could allow attackers to crash servers, potentially disrupting secure communications for thousands of users worldwide. The OpenVPN 2.6.14 release includes additional improvements beyond the security fix, such as repairs to Linux DCO source IP selection for –multihome, updates to OpenSSL 3.4.1, and several Windows-specific enhancements to the GUI and installer packages. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability, identified as CVE-2025-2704, affects OpenVPN versions 2.6.1 through 2.6.13 when configured with the –tls-crypt-v2 option, a feature commonly used to enhance privacy and prevent deep packet inspection (DPI).
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 04 Apr 2025 06:20:22 +0000