{"api_version":"1","generated_at":"2026-04-23T02:36:33+00:00","cve":"CVE-2021-3606","urls":{"html":"https://cve.report/CVE-2021-3606","api":"https://cve.report/api/cve/CVE-2021-3606.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-3606","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-3606"},"summary":{"title":"CVE-2021-3606","description":"OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).","state":"PUBLIC","assigner":"security@openvpn.net","published_at":"2021-07-02 13:15:00","updated_at":"2021-07-09 14:30:00"},"problem_types":["CWE-427"],"metrics":[],"references":[{"url":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements","name":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements","refsource":"MISC","tags":[],"title":"Just a moment...","mime":"text/html","httpstatus":"503","archivestatus":"503"},{"url":"https://community.openvpn.net/openvpn/wiki/CVE-2021-3606","name":"https://community.openvpn.net/openvpn/wiki/CVE-2021-3606","refsource":"MISC","tags":[],"title":"Just a moment...","mime":"text/html","httpstatus":"503","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-3606","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3606","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"3606","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"3606","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openvpn","cpe5":"openvpn","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-3606","ASSIGNER":"security@openvpn.net","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"OpenVPN-GUI","version":{"version_data":[{"version_value":"2.5.2 and prior releases"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-427 Uncontrolled Search Path Element"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements","url":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements"},{"refsource":"MISC","name":"https://community.openvpn.net/openvpn/wiki/CVE-2021-3606","url":"https://community.openvpn.net/openvpn/wiki/CVE-2021-3606"}]},"description":{"description_data":[{"lang":"eng","value":"OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe)."}]}},"nvd":{"publishedDate":"2021-07-02 13:15:00","lastModifiedDate":"2021-07-09 14:30:00","problem_types":["CWE-427"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*","versionEndExcluding":"2.5.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"3606","Ordinal":"210289","Title":"CVE-2021-3606","CVE":"CVE-2021-3606","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"3606","Ordinal":"1","NoteData":"OpenVPN before version 2.5.3 on Windows allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (openvpn.exe).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"3606","Ordinal":"2","NoteData":"2021-07-02","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"3606","Ordinal":"3","NoteData":"2021-07-02","Type":"Other","Title":"Modified"}]}}}