tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openvpn
Openvpn tap-windows6 |
|
| CPEs | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openvpn
Openvpn tap-windows6 |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: OpenVPN
Published: 2024-07-08T17:27:44.097Z
Updated: 2024-08-23T03:55:36.778Z
Reserved: 2024-02-07T13:22:25.493Z
Link: CVE-2024-1305
Updated: 2024-08-01T18:33:25.379Z
Status : Analyzed
Published: 2024-07-08T18:15:07.150
Modified: 2025-08-22T15:36:38.907
Link: CVE-2024-1305
No data.