Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

openvpn

About This Vendor

openvpn is a technology vendor producing software and infrastructure products. As a software provider, openvpn's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of openvpn's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 67 known vulnerabilities from openvpn. This includes 9 critical-severity issues and 31 high-severity issues that represent significant risk. These vulnerabilities affect 19 distinct products across openvpn's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2005 through 2025, indicating decades of continuous security attention and research. Organizations deploying openvpn products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-2531 2005-08-24 2025-04-03 - 5.0 Likely
CVE-2005-2532 2005-08-24 2025-04-03 - 5.0 Likely
CVE-2005-2533 2005-08-24 2025-04-03 - 2.1 Unknown
CVE-2005-2534 2005-08-24 2025-04-03 - 2.6 Unknown
CVE-2005-3393 2005-11-01 2025-04-03 - 7.5 Likely
CVE-2005-3409 2005-11-02 2025-04-03 - 5.0 Likely
CVE-2006-1629 2006-04-06 2025-04-03 - 9.0 Likely
CVE-2006-2229 2006-05-05 2025-04-03 - 4.0 Unknown
CVE-2008-3459 2008-08-04 2025-04-09 - 7.6 Unknown
CVE-2013-2061 2013-11-18 2025-04-11 - 2.6 Unknown
CVE-2013-2692 2014-05-13 2025-04-12 - 6.8 Likely
CVE-2014-5455 2014-08-25 2025-04-12 - 6.9 Unknown
CVE-2014-9104 2014-11-26 2025-04-12 - 6.8 Likely
CVE-2014-8104 2014-12-03 2025-04-12 - 6.8 Likely
CVE-2016-6329 2017-01-31 2025-04-20 5.9 4.3 Likely
CVE-2017-7478 2017-05-15 2025-04-20 7.5 5.0 Likely
CVE-2017-7479 2017-05-15 2025-04-20 6.5 4.0 Likely
CVE-2017-5868 2017-05-26 2025-04-20 6.1 4.3 Likely
CVE-2017-7508 2017-06-27 2025-04-20 7.5 5.0 Likely
CVE-2017-7520 2017-06-27 2025-04-20 7.4 4.0 Unknown
CVE-2017-7521 2017-06-27 2025-04-20 5.9 4.3 Likely
CVE-2017-7522 2017-06-27 2025-04-20 6.5 4.0 Likely
CVE-2017-12166 2017-10-04 2025-04-20 9.8 6.8 Likely
CVE-2018-7544 2018-03-16 2024-11-21 9.1 6.4 Likely
CVE-2018-9336 2018-05-01 2024-11-21 7.8 4.6 Unknown
CVE-2020-8953 2020-02-13 2024-11-21 9.8 7.5 Likely
CVE-2020-9442 2020-02-28 2024-11-21 7.8 7.2 Unknown
CVE-2020-11810 2020-04-27 2024-11-21 3.7 4.3 Likely
CVE-2020-11462 2020-05-04 2024-11-21 7.5 4.3 Likely
CVE-2020-15074 2020-07-14 2024-11-21 7.5 5.0 Likely
CVE-2020-15075 2021-03-30 2024-11-21 7.1 3.6 Unknown
CVE-2020-15078 2021-04-26 2024-11-21 7.5 5.0 Likely
CVE-2020-15076 2021-05-26 2024-11-21 7.8 7.2 Unknown
CVE-2020-15077 2021-06-04 2024-11-21 5.3 3.5 Unknown
CVE-2020-36382 2021-06-04 2024-11-21 7.5 5.0 Likely
CVE-2021-3606 2021-07-02 2024-11-21 7.8 4.4 Unknown
CVE-2021-3613 2021-07-02 2024-11-21 7.8 4.4 Unknown
CVE-2021-3547 2021-07-12 2024-11-21 7.4 5.8 Likely
CVE-2021-3824 2021-09-23 2024-11-21 6.1 4.3 Likely
CVE-2022-0547 2022-03-18 2025-11-03 9.8 7.5 Likely
CVE-2022-33737 2022-07-06 2024-11-21 7.5 5.0 Likely
CVE-2022-33738 2022-07-06 2024-11-21 7.5 5.0 Likely
CVE-2021-4234 2022-07-06 2024-11-21 7.5 5.0 Likely
CVE-2020-20813 2023-08-22 2024-11-21 7.5 - -
CVE-2022-3761 2023-10-17 2024-11-21 5.9 - -
CVE-2023-46849 2023-11-11 2025-06-11 7.5 - -
CVE-2023-46850 2023-11-11 2024-11-21 9.8 - -
CVE-2023-7224 2024-01-08 2024-11-21 7.8 - -
CVE-2023-7245 2024-02-20 2025-04-02 7.8 - -
CVE-2023-7235 2024-02-21 2025-05-06 8.4 - -
CVE-2023-6247 2024-02-29 2025-08-21 6.5 - -
CVE-2024-24974 2024-07-08 2024-11-21 7.5 - -
CVE-2024-27459 2024-07-08 2024-11-21 7.8 - -
CVE-2024-27903 2024-07-08 2024-11-21 9.8 - -
CVE-2024-1305 2024-07-08 2025-08-22 9.8 - -
CVE-2024-28882 2024-07-08 2025-06-10 4.3 - -
CVE-2024-5594 2025-01-06 2025-11-03 9.1 - -
CVE-2024-8474 2025-01-06 2025-06-10 7.5 - -
CVE-2024-5198 2025-01-15 2025-06-10 3.3 - -
CVE-2024-13454 2025-01-20 2025-08-22 5.3 - -
CVE-2025-2704 2025-04-02 2025-10-23 7.5 - -
CVE-2024-4877 2025-04-03 2025-04-29 8.8 - -
CVE-2025-3908 2025-05-19 2025-06-12 6.2 - -
CVE-2025-50054 2025-06-20 2025-08-21 5.5 - -
CVE-2025-12106 2025-12-01 2025-12-30 9.1 - -
CVE-2025-13751 2025-12-03 2026-01-30 5.5 - -
CVE-2025-13086 2025-12-03 2026-01-30 7.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for openvpn by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with openvpn's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.