CVE-2025-3908
Linux Debian vulnerability analysis and mitigation

Overview

The vulnerability (CVE-2025-3908) affects the configuration initialization tool in OpenVPN 3 Linux versions v20 through v24. The security issue was discovered and initially disclosed on May 19, 2025. The vulnerability specifically impacts the 'openvpn3-admin init-config' command, which was introduced in OpenVPN 3 Linux v20 and must be run as root (OpenVPN Security, OSS Security).

Technical details

The vulnerability is classified as CWE-59 (Improper Link Resolution Before File Access), also known as 'Link Following'. It has received a CVSS v3.1 Base Score of 6.2 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that local access is required but no privileges or user interaction are needed (Wiz, NVD).

Impact

The vulnerability allows a local attacker to use symlinks pointing at an arbitrary directory, which results in unauthorized changes to the ownership and permissions of that destination directory. The tool will follow symlinks when changing ownership and permissions on two of the directories that the OpenVPN 3 Linux D-Bus services depend on (Wiz, OSS Security).

Mitigation and workarounds

The vulnerability has been resolved in OpenVPN 3 Linux v24.1, released on May 19, 2025. Users are advised to upgrade to a version newer than OpenVPN 3 Linux v24 (OSS Security, Wiz).

Community reactions

The vulnerability was discovered and reported by Wolfgang Frisch from the SUSE Security team, demonstrating effective collaboration between security researchers and the OpenVPN development team (OSS Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management