Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks
HelpNet Security ^ | 14 August 2023 | Zeljka Zorz

Posted on 08/17/2023 5:32:22 AM PDT by ShadowAce

Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, researchers have discovered.

“Our attacks are not computationally expensive, meaning anyone with the appropriate network access can perform them, and they are independent of the VPN protocol being used,” claim Nian Xue of New York University; Yashaswi Malla, Zihang Xia, and Christina Pöpper of New York University Abu Dhabi; and Mathy Vanhoef of KU Leuven University.

“Even if the victim is using another layer of encryption such as HTTPS, our attacks reveal which websites a user is visiting, which can be a significant privacy risk.”

The VPN vulnerabilities and possible attacks

The unearthed vulnerabilities have received four distinct CVE numbers: CVE-2023-36672, CVE-2023-35838, CVE-2023-36673, and CVE-2023-36671. Since there are so many vulnerable solutions, those numbers will denote each vulnerability independently of which solution/codebase they affect.

The first pair of bugs can be exploited in a LocalNet attack, i.e., when a user connects to an Wi-Fi or Ethernet network set up by an attacker. The latter pair can be leveraged in a ServerIP attack, either by attackers that are running an untrusted Wi-Fi/Ethernet network or by malicious internet service providers (ISPs).

“Both attacks manipulate the victim’s routing table to trick the victim into sending traffic outside the protected VPN tunnel, allowing an adversary to read and intercept transmitted traffic,” the researchers say.

A video demonstration of three attacks is available. The researchers have also released scripts that can be used to check whether a VPN client is vulnerable.

“Once a large enough fraction of devices has been patched, and if deemed necessary and/or beneficial, the attack script will be publicly released as well,” they added.

Vulnerable apps/clients and mitigation advice

After testing many consumer and enterprise-grade VPN solutions, they found that most VPNs for Apple devices (whether computers, iPhones or iPads) and Windows and Linux devices are vulnerable to one or both attacks. On Android, only a quarter or so VPN apps are vulnerable – likely do to a “carefully designed” API.

Built-in VPN clients of Windows, macOS, and iOS are also vulnerable, as are some on Linux.

The researchers say that they are not aware of the vulnerabilities being exploited in the wild, but also noted that it would be difficult to discover if they were.

They notified a bunch of VPN vendors about the vulnerabilities they found. Some of those vendors have already squashed the bugs without mentioning them in the update release notes (to comply with the researchers’ request of keeping them secret until their research had been published).

A full list of tested VPN apps on various devices is available at the end of the researchers’ paper, so you might want to check whether the one you use in on that list and, if it is and it’s vulnerable, check whether the vendor has fixed the bugs. If that information is not publicly available, you may want to contact the vendor’s tech support and ask.

“Some example patched VPNs are Mozilla VPN, Surfshark, Malwarebytes, Windscribe (can import OpenVPN profiles), and Cloudflare’s WARP,” the researchers shared.

Cisco has confirmed that its Cisco Secure Client and AnyConnect Secure Mobility Client for Linux, macOS, and Windows are vulnerable to CVE-2023-36672, but only in a specific, non-default configuration. Mullvad says only its iOS app is vulnerable to the LocalNet attack.

“If updates for your VPN are not available, you can mitigate the LocalNet attack by disabling local network access. You can also mitigate attacks by assuring websites use HTTPS, which many websites nowadays support,” the researchers advised.


TOPICS: Computers/Internet
KEYWORDS: internet; security; vpn

1 posted on 08/17/2023 5:32:22 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 08/17/2023 5:32:36 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

We’re doomed.


3 posted on 08/17/2023 5:48:14 AM PDT by NautiNurse (🇺🇸 Selling out the U.S.A.: The Briben Brand™)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

4 posted on 08/17/2023 6:34:37 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thank you...


5 posted on 08/17/2023 7:23:39 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Comment from a CISSP type I know:

We’re going to have to go back to one time pads and carrier pigeons


6 posted on 08/17/2023 7:34:59 AM PDT by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

So do not connect to WIFI you do not know.


7 posted on 08/17/2023 7:39:51 AM PDT by pas
[ Post Reply | Private Reply | To 1 | View Replies]

To: pas

> So do not connect to WIFI you do not know.

Yep, convenience is almost always is a trade off with security.


8 posted on 08/17/2023 8:07:06 AM PDT by glorgau
[ Post Reply | Private Reply | To 7 | View Replies]

To: ShadowAce
Wink, wink, (feigned outrage) how dare you show all those Naked Penguins, jumping for ice cream. (Yes, I do know that is a show of support for Linux software, a much superior software compared to Bill Gates & Redmond, Washington State trash.)

I live approx. 50 miles north of the SAN-FRAN-FREAK-O of the north, formerly known as Seattle.

9 posted on 08/17/2023 9:15:33 AM PDT by Stanwood_Dave ("Testilying." Cop's lie, only while testifying, as taught in their respected Police Academy(s). )
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

So don’t use split tunneling and maintain routing table fidelity? Not sure the major details are as revealing as they make it seem.


10 posted on 08/17/2023 3:27:42 PM PDT by rarestia (“A nation which can prefer disgrace to danger is prepared for a master, and deserves one.” -Hamilton)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson