{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8474","assignerOrgId":"36a55730-e66d-4d39-8ca6-3c3b3017965e","state":"PUBLISHED","assignerShortName":"OpenVPN","dateReserved":"2024-09-05T08:38:27.571Z","datePublished":"2025-01-06T14:33:26.129Z","dateUpdated":"2025-01-06T16:54:38.487Z"},"containers":{"cna":{"providerMetadata":{"orgId":"36a55730-e66d-4d39-8ca6-3c3b3017965e","shortName":"OpenVPN","dateUpdated":"2025-01-06T14:33:26.129Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-212","description":"CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer","type":"CWE"}]}],"affected":[{"vendor":"OpenVPN","product":"OpenVPN Connect","platforms":["Android"],"versions":[{"status":"affected","version":"0","lessThanOrEqual":"3.5.0","versionType":"all releases"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"OpenVPN Connect before version 3.5.0 can contain the configuration profile's clear-text private key which is logged in the application log, which an unauthorized actor can use to decrypt the VPN traffic"}],"references":[{"url":"https://openvpn.net/connect-docs/android-release-notes.html","tags":["release-notes"]}]},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-01-06T16:53:43.249831Z","id":"CVE-2024-8474","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-06T16:54:38.487Z"}}]}}