New attack leaks VPN traffic using rogue DHCP servers

New attack leaks VPN traffic using rogue DHCP servers

May 7, 2024 at 02:53PM

“TunnelVision” is a new attack that bypasses VPN encryption, allowing attackers to intercept unencrypted traffic while appearing secure. Exploiting a flaw in DHCP, attackers set up a rogue server to alter routing and snoop on VPN traffic. The vulnerability affects various operating systems. Mitigation strategies include using network namespaces, denying non-VPN traffic, and avoiding untrusted networks.

Certainly! Here are the key takeaways from the meeting notes regarding the TunnelVision attack and its mitigations:

– A new attack named “TunnelVision” exploits the DHCP protocol’s option 121 to redirect VPN traffic to a rogue server, enabling attackers to intercept unencrypted data.
– The vulnerability (CVE-2024-3661) has been identified by Leviathan Security, which has informed impacted vendors, CISA, and the EFF and publicly disclosed the issue to raise awareness.
– Users are at risk of TunnelVision attacks when connecting to networks controlled by attackers, and if the VPN client is susceptible to routing manipulation and automatic DHCP configuration is enabled.
– Mitigations for VPN users include using network namespaces on Linux, configuring VPN clients to deny non-VPN traffic, ignoring DHCP option 121, connecting via personal hotspots or within virtual machines, and avoiding untrusted networks.
– VPN providers are encouraged to enhance client software to implement their own DHCP handlers and integrate additional security checks to prevent risky DHCP configurations.

Let me know if there’s anything else you’d like to add or modify!

Full Article