{"api_version":"1","generated_at":"2026-04-23T02:36:40+00:00","cve":"CVE-2021-3613","urls":{"html":"https://cve.report/CVE-2021-3613","api":"https://cve.report/api/cve/CVE-2021-3613.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-3613","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-3613"},"summary":{"title":"CVE-2021-3613","description":"OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).","state":"PUBLIC","assigner":"security@openvpn.net","published_at":"2021-07-02 13:15:00","updated_at":"2021-07-09 14:33:00"},"problem_types":["CWE-427"],"metrics":[],"references":[{"url":"https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/","name":"https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/","refsource":"MISC","tags":[],"title":"OpenVPN Connect For Windows Change Log | OpenVPN","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-3613","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3613","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"3613","vulnerable":"1","versionEndIncluding":"3.3.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"openvpn","cpe5":"connect","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-3613","ASSIGNER":"security@openvpn.net","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"OpenVPN Connect","version":{"version_data":[{"version_value":"3.2.0 up to 3.3.0"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-427 Uncontrolled Search Path Element"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/","url":"https://openvpn.net/vpn-server-resources/openvpn-connect-for-windows-change-log/"}]},"description":{"description_data":[{"lang":"eng","value":"OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe)."}]}},"nvd":{"publishedDate":"2021-07-02 13:15:00","lastModifiedDate":"2021-07-09 14:33:00","problem_types":["CWE-427"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":4.4},"severity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:openvpn:connect:*:*:*:*:*:windows:*:*","versionStartIncluding":"3.2.0","versionEndIncluding":"3.3.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"3613","Ordinal":"210697","Title":"CVE-2021-3613","CVE":"CVE-2021-3613","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"3613","Ordinal":"1","NoteData":"OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"3613","Ordinal":"2","NoteData":"2021-07-02","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"3613","Ordinal":"3","NoteData":"2021-07-02","Type":"Other","Title":"Modified"}]}}}