GHSA-hqmp-g7ph-x543

Suggest an improvement
Source
https://github.com/advisories/GHSA-hqmp-g7ph-x543
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-hqmp-g7ph-x543/GHSA-hqmp-g7ph-x543.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-hqmp-g7ph-x543
Published
2024-12-27T18:12:47Z
Modified
2024-12-27T18:12:47Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
TunnelVision - decloaking VPNs using DHCP
Details

A new decloaking technique for nearly all VPN implementations has been found, which allows attackers to inject entries into the routing tables of unsuspecting victims using DHCP option 121. This allows attackers to redirect traffic, which is supposed to be sent encrypted over the VPN, through the physical interface handling DHCP for the network the victim's computer is connected to, effectively bypassing the VPN connection.

Impact

All users are potentially affected, as this attack vector can be used against any VPN implementation without mitigations in place.

Patches

Currently, there are no existing mitigations employed by Quincy.

Workarounds

Disabling DHCP option 121 in the DHCP client is a potential workaround, as it prevents this kind of attack.

References

https://www.leviathansecurity.com/blog/tunnelvision

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-12-27T18:12:47Z"
}
References

Affected packages

crates.io / quincy

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.13.0