Tunnelblick's graphical interface allows users to manage OpenVPN servers on macOS.
Tunnelblick, the go-to graphical interface for OpenVPN on macOS, just got safer thanks to a major security fix. The security issue, discovered by PT SWARM's Egor Filatov, put Apple users at risk—even those who thought they were safe after deleting the app. If exploited, the vulnerability allowed attackers to elevate their system privileges and steal data. Companies whose employees use Tunnelblick on their work devices could face the risk of a cyberattack spreading to the corporate IT infrastructure.
Tunnelblick is an open-source graphical interface for OpenVPN, the world's second most popular VPN solution. In July, 3,100 users added Tunnelblick to their favorites, and its GitHub repository has been forked more than 350 times.
The vulnerability, tracked as CVE-2025-43711, received a CVSS 3.1 score of 8.1 out of 10, indicating high severity. The bug affected all versions of Tunnelblick from 3.5beta06 up to 6.1beta2. Given the right conditions, an attacker could gain elevated privileges on a victim's computer. If the attack targeted a corporate device, the hacker could gain a foothold in the organization's network to steal data, run ransomware, or otherwise disrupt business processes.