Description
Tunnelblick is an open source graphic user interface for OpenVPN on macOS. In versions 3.3beta26 through 9.0beta01, any local user can read arbitrary root-owned files by exploiting a symlink following vulnerability in tunnelblick-helper, reachable through the world-accessible tunnelblickd Unix socket. The socket is configured with mode 0666, allowing any local user to connect. No authorization check is performed on the connecting client. The tunnelblick-helper process constructs a path to config.ovpn inside a user-controlled .tblk directory and reads it as root without symlink validation. An attacker can create a .tblk configuration with a symlinked config.ovpn pointing to any file and request tunnelblickd to read it. This issue has been fixed in versions 9.0beta02.
INFO
Published Date :
2026-05-05T18:55:41.737Z
Last Modified :
2026-05-05T19:37:47.926Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-31893 vulnerability.
| Vendors | Products |
|---|---|
| Tunnelblick |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-31893.