Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Feb 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:veepn:veepn:*:*:*:*:*:*:*:* | |
| References |
|
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Oct 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Veepn
Veepn veepn |
|
| Vendors & Products |
Veepn
Veepn veepn |
Mon, 27 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in VeePN up to 1.6.2. This affects an unknown function of the file C:\Program Files (x86)\VeePN\avservice\avservice.exe of the component AVService. This manipulation causes unquoted search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | VeePN AVService avservice.exe unquoted search path | |
| Weaknesses | CWE-426 CWE-428 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T07:11:49.249Z
Reserved: 2025-10-26T16:23:28.429Z
Link: CVE-2025-12286
Updated: 2026-01-07T16:51:40.577Z
Status : Deferred
Published: 2025-10-27T14:15:40.190
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12286
No data.
OpenCVE Enrichment
Updated: 2025-10-27T22:03:45Z