tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openvpn
Openvpn tap-windows6 |
|
CPEs | cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:* | |
Vendors & Products |
Openvpn
Openvpn tap-windows6 |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: OpenVPN
Published: 2024-07-08T17:27:44.097Z
Updated: 2024-08-23T03:55:36.778Z
Reserved: 2024-02-07T13:22:25.493Z
Link: CVE-2024-1305

Updated: 2024-08-01T18:33:25.379Z

Status : Analyzed
Published: 2024-07-08T18:15:07.150
Modified: 2025-08-22T15:36:38.907
Link: CVE-2024-1305

No data.