, , ,

Major new online tunneling vulnerability could put millions of devices at risk


  • Security researchers find multiple vulnerabilities in different tunneling protocols
  • The bugs allowed threat actors to mount DoS attacks, and more
  • The majority of vulnerable endpoints were in China

Millions of VPN servers, home routers, and other internet hosts could be carrying multiple vulnerabilities which could allow threat actors to perform anonymous attacks and could grant them access to private networks, experts have warned.

New research from Mathy Vanhoef, a professor at the KU Leuven university in Belgium, PhD student Angelos Beitis, and Top10VPN discovered the vulnerabilities in multiple tunneling protocols: IPIP/IP6IP6, GRE/GRE6, 4in6 and 6in4, and were given these identifiers: CVE-2024-7595, CVE-2025-23018, CVE-2025-23019 and CVE-2024-7596.

VPN tunneling protocols are methods used to securely transmit data between a user’s device and a VPN server by encapsulating it within an encrypted tunnel. Common protocols include PPTP, L2TP/IPsec, OpenVPN, and WireGuard, each offering varying levels of speed, security, and compatibility.

Millions of potential victims

The vulnerable ones primarily function to encapsulate one type of IP packet (IPv4 or IPv6) within another for network routing purposes. Unlike VPN-specific protocols, these are generally used for network transport rather than encryption or secure communication.

The research argues the misconfigured systems accept tunneling packets without confirming the identity of the sender, making it, “trivial to inject traffic into the vulnerable protocols’ tunnels.”

A malicious actor could send a packet encapsulated using one of the affected protocols with two IP headers, in which the outer header contains the attackers’ source IP with the vulnerable host’s IP as the destination. The inner header’s source IP is that of the vulnerable host IP, while the destination IP is of the target.

So, when the vulnerable host receives the packet, it strips the outer IP header and forwards the inner packet to its destination, paving the way for the creation of a one-way proxy, and abusing the bug to run DoS attacks, DNS spoofing, and more.

The researcher said they scanned the internet for vulnerable hosts and found 4.26 million, including various VPN servers, ISP-provided home routers, core internet routers, mobile network gateways and nodes, and CDN nodes, most of which were located in China.

“All vulnerable hosts can be hijacked to perform anonymous attacks, as the outer packet headers containing an attacker’s real IP address are stripped. These attacks are easily traceable to the compromised host, however, which can then be secured,” the researchers explained.

“Spoofing-capable hosts can have ANY IP address as the source address in the inner packet, so not only does an attacker remain anonymous, but the compromised host also becomes much harder to discover and secure,” they added.

You might also like

https://www.techradar.com/pro/security/major-new-online-tunneling-vulnerability-could-put-millions-of-devices-at-risk


Leave a Reply

Your email address will not be published. Required fields are marked *

January 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 1014: Just Say It's Capitalism – CES 2025, Meta News, Newag DRM This Week in Tech (Audio)

The panel discusses CES 2025 How Watch Duty's wildfire tracking app became a crucial lifeline for LA Worst in Show awards 2025 Aaron Swartz v Sam Altman We've not been trained for this: life after the Newag DRM disclosure All the Meta stuff (fact checking, etc.) Heritage Foundation plans to 'identify and target' Wikipedia editors The Government Wants to Protect Robux From Hackers Twitch Streamers Come Home After Big-Money Contracts at Rivals Dried Up Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location Host: Leo Laporte Guests: Nicholas De Leon, Fr. Robert Ballecer, SJ, and Cory Doctorow Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: coda.io/twit expressvpn.com/twit threatlocker.com for This Week in Tech uscloud.com bitwarden.com/twit
  1. TWiT 1014: Just Say It's Capitalism – CES 2025, Meta News, Newag DRM
  2. TWiT 1013: Calamari in Crisis – Touching the Sun, Fake Spotify Artists, Banished Words
  3. TWiT 1012: Our Best Of 2024 – The Best Moments From TWiT's 2024
  4. TWiT 1011: The Year in Review – A Look at the Top Stories of 2024
  5. TWiT 1010: The Densest State in the US – TikTok Ban, Drones Over Jersey, GM Quits Robotaxis