Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ocW1wLWc3cGgteDU0M84ABCyR
TunnelVision - decloaking VPNs using DHCP
A new decloaking technique for nearly all VPN implementations has been found, which allows attackers to inject entries into the routing tables of unsuspecting victims using DHCP option 121. This allows attackers to redirect traffic, which is supposed to be sent encrypted over the VPN, through the physical interface handling DHCP for the network the victim's computer is connected to, effectively bypassing the VPN connection.
Impact
All users are potentially affected, as this attack vector can be used against any VPN implementation without mitigations in place.
Patches
Currently, there are no existing mitigations employed by Quincy.
Workarounds
Disabling DHCP option 121 in the DHCP client is a potential workaround, as it prevents this kind of attack.
References
https://www.leviathansecurity.com/blog/tunnelvision
Permalink: https://github.com/advisories/GHSA-hqmp-g7ph-x543JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ocW1wLWc3cGgteDU0M84ABCyR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 27 days ago
Updated: 27 days ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-hqmp-g7ph-x543
References:
- https://github.com/M0dEx/quincy/security/advisories/GHSA-hqmp-g7ph-x543
- https://www.leviathansecurity.com/blog/tunnelvision
- https://github.com/advisories/GHSA-hqmp-g7ph-x543
Blast Radius: 1.0
Affected Packages
cargo:quincy
Dependent packages: 0Dependent repositories: 0
Downloads: 31,452 total
Affected Version Ranges: <= 0.13.0
No known fixed version
All affected versions: 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.3.0, 0.3.1, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.5.0, 0.5.1, 0.6.0, 0.6.1, 0.7.0, 0.7.1, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.10.0, 0.10.1, 0.10.2, 0.10.3, 0.10.4, 0.11.0, 0.11.1, 0.11.2, 0.12.0, 0.12.1, 0.12.2, 0.12.3, 0.13.0