The OpenVPN project has released a crucial security update with the launch of version 2.7_rc2, addressing a high-severity vulnerability that could leave systems exposed to remote attacks. The release candidate fixes two specific CVEs, including a critical buffer over-read issue, while also introducing significant hardening measures for Windows services.
The most severe vulnerability, tracked as CVE-2025-12106, carries a critical CVSS score of 9.1. This flaw strikes at the core of how the software handles modern network addressing.
According to the security advisory, the vulnerability is caused by “insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1,” which “allows an attacker to trigger a heap buffer over-read when parsing IP addresses.”
Heap buffer over-reads can be particularly dangerous. While often leading to crashes (DoS), in certain contexts, they can allow attackers to leak sensitive memory data from the server process. This specific flaw affects the experimental 2.7 branch, specifically versions 2.7_alpha1 through 2.7_rc1.
The second vulnerability, CVE-2025-13086, represents a logic failure in the software’s defensive mechanisms. This issue involves the Hash-Based Message Authentication Code (HMAC) verification check, a system designed to authenticate the source of incoming packets before the server commits resources to them.
The advisory reveals a startling coding error: “Due to a program code mistake all hmac cookies are accepted, thus breaking source IP address validation.”
The consequences of this bypass are significant for server resource management and security. “As a consequence, TLS sessions can be opened and state can be consumed in the server from IP addresses that did not initiate an initial connection”. This opens the door for attackers to flood the server with illegitimate sessions, potentially leading to resource exhaustion.
Unlike the IPv6 flaw, this vulnerability has a wider blast radius, affecting stable versions as well. OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 are affected”
Beyond security patches, the release of version 2.7_rc2 brings notable changes to the Windows subsystem, including hardening of the service backend and fixes for DNS address list generation. However, these improvements come at a cost for legacy infrastructure.
The changelog issues a stark warning for administrators clinging to outdated operating systems: “[NOTE: this breaks OpenVPN compatibility with Windows 7]”. This move aligns OpenVPN with broader industry trends of sunsetting support for the end-of-life OS to ensure better security architectures.
To remediate these threats, administrators are strongly advised to upgrade their deployments immediately.
- For 2.7.x users: The flaws are fixed in version 2.7_rc2.
- For 2.6.x users: The HMAC flaw is fixed in version 2.6.16.
In addition to these patches, the new release fixes other bugs, including “invalid pointer creation / memory overread in tls_pre_decrypt” and improves debug messaging for FreeBSD environments.
Related Posts:
- OpenVPN Patches Serious Vulnerabilities in Windows Installations
- OpenVPN Driver Flaw: Local Users Can Crash Windows Systems via Buffer Overflow
- High-Severity OpenVPN Flaw (CVE-2025-10680) Allows Script Injection on Linux/macOS via Malicious DNS Server
- OpenVPN Addresses False Zero-Day Claims, Releases Security Patches