DEBIAN-CVE-2025-13086

Source
https://security-tracker.debian.org/tracker/CVE-2025-13086
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13086.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-13086
Upstream
Downstream
Published
2025-12-03T20:16:24.353Z
Modified
2026-01-31T10:16:00.448934Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7alpha1 through 2.7rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client

References

Affected packages

Debian:12 / openvpn

Package

Name
openvpn
Purl
pkg:deb/debian/openvpn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.3-1+deb12u4

Affected versions

2.*
2.6.3-1
2.6.3-1+deb12u1~bpo11+1
2.6.3-1+deb12u1
2.6.3-1+deb12u2~bpo11+1
2.6.3-1+deb12u2
2.6.3-1+deb12u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13086.json"

Debian:13 / openvpn

Package

Name
openvpn
Purl
pkg:deb/debian/openvpn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.14-1+deb13u1

Affected versions

2.*
2.6.14-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13086.json"

Debian:14 / openvpn

Package

Name
openvpn
Purl
pkg:deb/debian/openvpn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.0~rc2-2

Affected versions

2.*
2.6.14-1
2.6.14-2
2.6.15-1
2.7.0~alpha1-1
2.7.0~alpha2-1
2.7.0~alpha3-1
2.7.0~beta1-1
2.7.0~beta2-1
2.7.0~beta3-1
2.7.0~rc1-1
2.7.0~rc2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-13086.json"