thewayne: (Default)
[personal profile] thewayne
Because of the age of the vulnerability, there's a good chance that it /may/ have been used in the wild. However, it's not an easy attack to implement. It's more suited for non-home networks as it requires inserting a second DHCP server into the network and implementing a DHCP Option 121, which lets you divert non-encrypted VPN traffic onto the network of your choice. You receive the clear traffic, the person on the VPN sees their traffic as still being on the VPN.

Very interesting!

Even more interesting, Android is the only OS immune to it! Baked in to its DHCP system, it ignores changes to its option 121, so it cannot be spoofed in this manner. Linux, Windows, MacOS, iOS are all potentially vulnerable. Linux users/admins can avoid this apparently by using Network Namespaces, I know nothing about this as I'm pretty minimally fluent when it comes to *nix.

To install an additional DHCP server, you need a proverbial evil admin, and it's probably going to be tricky to hide a second DHCP server from network audits. For home users, unless your WiFi router has been compromised, I don't think there's anything to worry about.

https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/

Date: 2024-05-12 07:39 pm (UTC)
rain_gryphon: (Default)
From: [personal profile] rain_gryphon
How very novel! I agree that it would be difficult to conceal, though, which limits it's usability.

July 2025

S M T W T F S
   1 2345
67891011 12
13 1415 1617 18 19
2021 22 23242526
2728 293031  

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 31st, 2025 04:23 am
Powered by Dreamwidth Studios