DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
15 Jan 2025, 16:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
F5
Paloaltonetworks Zscaler Watchguard ipsec Mobile Vpn Client Fortinet Watchguard mobile Vpn With Ssl Linux linux Kernel Cisco Cisco secure Client Watchguard Citrix Apple iphone Os Cisco anyconnect Vpn Client Apple Zscaler client Connector Apple macos Citrix secure Access Client F5 big-ip Access Policy Manager Fortinet forticlient Linux Paloaltonetworks globalprotect |
|
References | () https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/ - Exploit, Press/Media Coverage | |
References | () https://bst.cisco.com/quickview/bug/CSCwk05814 - Third Party Advisory | |
References | () https://datatracker.ietf.org/doc/html/rfc2131#section-7 - Related | |
References | () https://datatracker.ietf.org/doc/html/rfc3442#section-7 - Related | |
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-170 - Vendor Advisory | |
References | () https://issuetracker.google.com/issues/263721377 - Issue Tracking | |
References | () https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/ - Exploit, Press/Media Coverage | |
References | () https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic - Issue Tracking | |
References | () https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision - Third Party Advisory | |
References | () https://my.f5.com/manage/s/article/K000139553 - Vendor Advisory | |
References | () https://news.ycombinator.com/item?id=40279632 - Issue Tracking | |
References | () https://news.ycombinator.com/item?id=40284111 - Issue Tracking | |
References | () https://security.paloaltonetworks.com/CVE-2024-3661 - Vendor Advisory | |
References | () https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661 - Vendor Advisory | |
References | () https://tunnelvisionbug.com/ - Exploit, Third Party Advisory | |
References | () https://www.agwa.name/blog/post/hardening_openvpn_for_def_con - Related | |
References | () https://www.leviathansecurity.com/research/tunnelvision - Third Party Advisory | |
References | () https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/ - Exploit, Press/Media Coverage | |
References | () https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009 - Mitigation, Vendor Advisory | |
References | () https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:zscaler:client_connector:-:*:*:*:*:windows:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:* cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* cpe:2.3:a:cisco:anyconnect_vpn_client:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:windows:*:* cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:* cpe:2.3:a:watchguard:mobile_vpn_with_ssl:*:*:*:*:*:macos:*:* cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:windows:*:* cpe:2.3:a:watchguard:ipsec_mobile_vpn_client:*:*:*:*:*:macos:*:* cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:iphone_os:*:* cpe:2.3:a:fortinet:forticlient:7.4.0:*:*:*:*:macos:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:secure_client:-:*:*:*:*:*:*:* cpe:2.3:a:watchguard:ipsec_mobile_vpn_client:*:*:*:*:*:windows:*:* cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:* |
21 Nov 2024, 09:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/ - | |
References | () https://bst.cisco.com/quickview/bug/CSCwk05814 - | |
References | () https://datatracker.ietf.org/doc/html/rfc2131#section-7 - | |
References | () https://datatracker.ietf.org/doc/html/rfc3442#section-7 - | |
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-170 - | |
References | () https://issuetracker.google.com/issues/263721377 - | |
References | () https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/ - | |
References | () https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic - | |
References | () https://mullvad.net/en/blog/evaluating-the-impact-of-tunnelvision - | |
References | () https://my.f5.com/manage/s/article/K000139553 - | |
References | () https://news.ycombinator.com/item?id=40279632 - | |
References | () https://news.ycombinator.com/item?id=40284111 - | |
References | () https://security.paloaltonetworks.com/CVE-2024-3661 - | |
References | () https://support.citrix.com/article/CTX677069/cloud-software-group-security-advisory-for-cve20243661 - | |
References | () https://tunnelvisionbug.com/ - | |
References | () https://www.agwa.name/blog/post/hardening_openvpn_for_def_con - | |
References | () https://www.leviathansecurity.com/research/tunnelvision - | |
References | () https://www.theregister.com/2024/05/07/vpn_tunnelvision_dhcp/ - | |
References | () https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00009 - | |
References | () https://www.zscaler.com/blogs/security-research/cve-2024-3661-k-tunnelvision-exposes-vpn-bypass-vulnerability - |
01 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 May 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. |
07 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
07 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
06 May 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-06 19:15
Updated : 2025-01-15 16:50
NVD link : CVE-2024-3661
Mitre link : CVE-2024-3661
CVE.ORG link : CVE-2024-3661
JSON object : View
Products Affected
paloaltonetworks
- globalprotect
apple
- iphone_os
- macos
fortinet
- forticlient
cisco
- anyconnect_vpn_client
- secure_client
f5
- big-ip_access_policy_manager
watchguard
- mobile_vpn_with_ssl
- ipsec_mobile_vpn_client
linux
- linux_kernel
citrix
- secure_access_client
zscaler
- client_connector