ID

VAR-202407-0079


CVE

CVE-2024-5594


TITLE

OpenVPN Technologies  of  OpenVPN  Improper validation vulnerability for specified types of input

Trust: 0.8

sources: JVNDB: JVNDB-2024-024939

DESCRIPTION

OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs. OpenVPN Technologies of OpenVPN contains an improper validation vulnerability on input of a given type.Information may be obtained and information may be tampered with. SCALANCE M-800, MUM-800 and S615 as well as RUGGEDCOM RM1224 are industrial routers. Multiple Siemens products have a log output neutralization error vulnerability that can be exploited by attackers to send spam to the openvpn log, causing high CPU load. ========================================================================== Ubuntu Security Notice USN-6860-1 July 02, 2024 openvpn vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in OpenVPN. Software Description: - openvpn: virtual private network software Details: Reynir Björnsson discovered that OpenVPN incorrectly handled terminating client connections. A remote authenticated client could possibly use this issue to keep the connection active, bypassing certain security policies. This issue only affected Ubuntu 23.10, and Ubuntu 24.04 LTS. (CVE-2024-28882) Reynir Björnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS openvpn 2.6.9-1ubuntu4.1 Ubuntu 23.10 openvpn 2.6.5-0ubuntu1.2 Ubuntu 22.04 LTS openvpn 2.5.9-0ubuntu0.22.04.3 Ubuntu 20.04 LTS openvpn 2.4.12-0ubuntu0.20.04.2 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6860-1 CVE-2024-28882, CVE-2024-5594 Package Information: https://launchpad.net/ubuntu/+source/openvpn/2.6.9-1ubuntu4.1 https://launchpad.net/ubuntu/+source/openvpn/2.6.5-0ubuntu1.2 https://launchpad.net/ubuntu/+source/openvpn/2.5.9-0ubuntu0.22.04.3 https://launchpad.net/ubuntu/+source/openvpn/2.4.12-0ubuntu0.20.04.2

Trust: 2.25

sources: NVD: CVE-2024-5594 // JVNDB: JVNDB-2024-024939 // CNVD: CNVD-2024-45211 // PACKETSTORM: 179338

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-45211

AFFECTED PRODUCTS

vendor:openvpnmodel:openvpnscope:gteversion:2.6.0

Trust: 1.0

vendor:openvpnmodel:openvpnscope:ltversion:2.6.11

Trust: 1.0

vendor:openvpnmodel:openvpnscope: - version: -

Trust: 0.8

vendor:openvpnmodel:openvpnscope:eqversion: -

Trust: 0.8

vendor:openvpnmodel:openvpnscope:eqversion:2.6.0 that's all 2.6.11

Trust: 0.8

vendor:siemensmodel:scalance m-800 familyscope:ltversion:8.2

Trust: 0.6

vendor:siemensmodel:scalance s615 familyscope:ltversion:8.2

Trust: 0.6

vendor:siemensmodel:ruggedcom rm1224 familyscope:ltversion:8.2

Trust: 0.6

vendor:siemensmodel:scalance mum-800 familyscope:ltversion:8.2

Trust: 0.6

sources: CNVD: CNVD-2024-45211 // JVNDB: JVNDB-2024-024939 // NVD: CVE-2024-5594

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-5594
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-024939
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-45211
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2024-45211
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-5594
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-024939
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-45211 // JVNDB: JVNDB-2024-024939 // NVD: CVE-2024-5594

PROBLEMTYPE DATA

problemtype:CWE-1287

Trust: 1.0

problemtype:Improper validation for input of specified type (CWE-1287) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-024939 // NVD: CVE-2024-5594

THREAT TYPE

remote

Trust: 0.1

sources: PACKETSTORM: 179338

PATCH

title:Patch for Multiple Siemens products log output and error vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/617366

Trust: 0.6

sources: CNVD: CNVD-2024-45211

EXTERNAL IDS

db:NVDid:CVE-2024-5594

Trust: 3.3

db:ICS CERTid:ICSA-25-072-02

Trust: 0.8

db:ICS CERTid:ICSA-24-319-06

Trust: 0.8

db:JVNid:JVNVU96191615

Trust: 0.8

db:JVNid:JVNVU92252869

Trust: 0.8

db:JVNDBid:JVNDB-2024-024939

Trust: 0.8

db:SIEMENSid:SSA-354112

Trust: 0.6

db:CNVDid:CNVD-2024-45211

Trust: 0.6

db:PACKETSTORMid:179338

Trust: 0.1

sources: CNVD: CNVD-2024-45211 // PACKETSTORM: 179338 // JVNDB: JVNDB-2024-024939 // NVD: CVE-2024-5594

REFERENCES

url:https://community.openvpn.net/openvpn/wiki/cve-2024-5594

Trust: 1.8

url:https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-5594

Trust: 0.9

url:https://jvn.jp/vu/jvnvu96191615/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92252869/

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-02

Trust: 0.8

url:https://cert-portal.siemens.com/productcert/html/ssa-354112.html

Trust: 0.6

url:https://launchpad.net/ubuntu/+source/openvpn/2.5.9-0ubuntu0.22.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvpn/2.6.5-0ubuntu1.2

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6860-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvpn/2.6.9-1ubuntu4.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvpn/2.4.12-0ubuntu0.20.04.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2024-28882

Trust: 0.1

sources: CNVD: CNVD-2024-45211 // PACKETSTORM: 179338 // JVNDB: JVNDB-2024-024939 // NVD: CVE-2024-5594

CREDITS

Ubuntu

Trust: 0.1

sources: PACKETSTORM: 179338

SOURCES

db:CNVDid:CNVD-2024-45211
db:PACKETSTORMid:179338
db:JVNDBid:JVNDB-2024-024939
db:NVDid:CVE-2024-5594

LAST UPDATE DATE

2025-06-15T19:41:15.284000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-45211date:2024-11-18T00:00:00
db:JVNDBid:JVNDB-2024-024939date:2025-06-11T07:59:00
db:NVDid:CVE-2024-5594date:2025-06-10T16:26:11.807

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-45211date:2024-11-18T00:00:00
db:PACKETSTORMid:179338date:2024-07-03T15:08:36
db:JVNDBid:JVNDB-2024-024939date:2025-06-11T00:00:00
db:NVDid:CVE-2024-5594date:2025-01-06T14:15:08.807