
Cloud Vulnerability DB
A community-led vulnerabilities database
The OpenVPN GUI installer before version 2.6.9 contains a severe privilege escalation vulnerability (CVE-2023-7235) that affects Windows installations. The vulnerability stems from insufficient access control restrictions being applied to the installation directory of OpenVPN binaries when using a non-standard installation path (NVD, SecurityOnline).
Due to Windows' default permissive permissions, when OpenVPN is installed in a non-standard directory, any user on the system can modify files within the installation directory. This vulnerability has been assigned a CVSS v3.1 base score of 8.4 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating local access with no privileges required and high impacts on confidentiality, integrity, and availability (NVD).
An attacker exploiting this vulnerability could replace core OpenVPN components with malicious code, potentially gaining elevated control over the host system when the OpenVPN service process is restarted. This could lead to privilege escalation, allowing attackers to install malware, steal data, disrupt operations, or move laterally across the network (SecurityOnline).
OpenVPN has addressed this vulnerability in version 2.6.9. Users are strongly advised to upgrade to this version to protect against potential exploitation. The update includes proper access control restrictions for installation directories, preventing unauthorized users from modifying critical OpenVPN components (SecurityOnline).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."