Description
tap-windows6 driver version 9.26 and earlier does not properly
check the size data of incomming write operations which an attacker can
use to overflow memory buffers, resulting in a bug check and potentially
arbitrary code execution in kernel space
Published: 2024-07-08
Score: 9.8 Critical
EPSS: 8.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 Aug 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Openvpn
Openvpn tap-windows6
CPEs cpe:2.3:a:openvpn:tap-windows6:*:*:*:*:*:*:*:*
Vendors & Products Openvpn
Openvpn tap-windows6

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.04282}

epss

{'score': 0.04395}


Subscriptions

Openvpn Tap-windows6
cve-icon MITRE

Status: PUBLISHED

Assigner: OpenVPN

Published:

Updated: 2024-08-23T03:55:36.778Z

Reserved: 2024-02-07T13:22:25.493Z

Link: CVE-2024-1305

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.379Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-08T18:15:07.150

Modified: 2025-08-22T15:36:38.907

Link: CVE-2024-1305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses