- Description
- Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the next boot) by dragging a crafted Tunnelblick.app file into /Applications.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.1
- Impact score
- 6
- Exploitability score
- 1.4
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
- cve@mitre.org
- CWE-459
- Hype score
- Not currently trending
CVE-2025-43711 (CVSS:8.1, HIGH) is Awaiting Analysis. Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upo..https://t.co/OviA1WfRLG #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
10 Jul 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-43711 Tunnelblick Incomplete Uninstallation Leads to Root Code Execution Vulnerability https://t.co/HN8WczGcvt
@VulmonFeeds
5 Jul 2025
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-43711 Tunnelblick 3.5beta06 before 7.0, when incompletely uninstalled, allows attackers to execute arbitrary code as root (upon the next boot) by dragging a crafted Tunnelb… https://t.co/vwjyjuQmPh
@CVEnew
4 Jul 2025
844 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes