CVE-2023-7235
OpenVPN vulnerability analysis and mitigation

Overview

The OpenVPN GUI installer before version 2.6.9 contains a severe privilege escalation vulnerability (CVE-2023-7235) that affects Windows installations. The vulnerability stems from insufficient access control restrictions being applied to the installation directory of OpenVPN binaries when using a non-standard installation path (NVD, SecurityOnline).

Technical details

Due to Windows' default permissive permissions, when OpenVPN is installed in a non-standard directory, any user on the system can modify files within the installation directory. This vulnerability has been assigned a CVSS v3.1 base score of 8.4 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating local access with no privileges required and high impacts on confidentiality, integrity, and availability (NVD).

Impact

An attacker exploiting this vulnerability could replace core OpenVPN components with malicious code, potentially gaining elevated control over the host system when the OpenVPN service process is restarted. This could lead to privilege escalation, allowing attackers to install malware, steal data, disrupt operations, or move laterally across the network (SecurityOnline).

Mitigation and workarounds

OpenVPN has addressed this vulnerability in version 2.6.9. Users are strongly advised to upgrade to this version to protect against potential exploitation. The update includes proper access control restrictions for installation directories, preventing unauthorized users from modifying critical OpenVPN components (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Related OpenVPN vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12106CRITICAL9.1
  • OpenVPNOpenVPN
  • openvpn
NoYesDec 01, 2025
CVE-2025-10680HIGH8.8
  • OpenVPNOpenVPN
  • cpe:2.3:a:openvpn:openvpn
NoNoOct 24, 2025
CVE-2025-13086MEDIUM4.6
  • OpenVPNOpenVPN
  • cpe:2.3:a:openvpn:openvpn
NoYesDec 03, 2025
CVE-2025-13751LOW1.3
  • OpenVPNOpenVPN
  • openvpn
NoYesDec 03, 2025
CVE-2025-15497N/AN/A
  • OpenVPNOpenVPN
  • openvpn
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management