-
Notifications
You must be signed in to change notification settings - Fork 346
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a0e0a0a
commit 12008a0
Showing
1 changed file
with
59 additions
and
0 deletions.
There are no files selected for viewing
59 changes: 59 additions & 0 deletions
59
advisories/github-reviewed/2024/12/GHSA-hqmp-g7ph-x543/GHSA-hqmp-g7ph-x543.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-hqmp-g7ph-x543", | ||
"modified": "2024-12-27T18:12:47Z", | ||
"published": "2024-12-27T18:12:47Z", | ||
"aliases": [], | ||
"summary": "TunnelVision - decloaking VPNs using DHCP", | ||
"details": "A new decloaking technique for nearly all VPN implementations has been found, which allows attackers to inject entries into the routing tables of unsuspecting victims using DHCP option 121. This allows attackers to redirect traffic, which is supposed to be sent encrypted over the VPN, through the physical interface handling DHCP for the network the victim's computer is connected to, effectively bypassing the VPN connection.\n\n### Impact\nAll users are potentially affected, as this attack vector can be used against _any_ VPN implementation without mitigations in place.\n\n### Patches\nCurrently, there are no existing mitigations employed by Quincy.\n\n### Workarounds\nDisabling DHCP option 121 in the DHCP client is a potential workaround, as it prevents this kind of attack.\n\n### References\nhttps://www.leviathansecurity.com/blog/tunnelvision\n", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"package": { | ||
"ecosystem": "crates.io", | ||
"name": "quincy" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "ECOSYSTEM", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"last_affected": "0.13.0" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/M0dEx/quincy/security/advisories/GHSA-hqmp-g7ph-x543" | ||
}, | ||
{ | ||
"type": "PACKAGE", | ||
"url": "https://github.com/M0dEx/quincy" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.leviathansecurity.com/blog/tunnelvision" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-200" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": true, | ||
"github_reviewed_at": "2024-12-27T18:12:47Z", | ||
"nvd_published_at": null | ||
} | ||
} |