Original Article Text

Click to Toggle View

New attack leaks VPN traffic using rogue DHCP servers. A new attack dubbed "TunnelVision" can route traffic outside a VPN's encryption tunnel, allowing attackers to snoop on unencrypted traffic while maintaining the appearance of a secure VPN connection. The method, described in detail in a report by Leviathan Security, relies on the abuse of Dynamic Host Configuration Protocol's (DHCP) option 121, which permits the configuration of classless static routes on a client's system. The attackers set up a rogue DHCP server that alters the routing tables so that all VPN traffic is sent straight to the local network or a malicious gateway, never entering the encrypted VPN tunnel. "Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway," reads the report. "When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it." The issue lies in DHCP's lack of an authentication mechanism for incoming messages that could manipulate routes, and was assigned the vulnerability identifier CVE-2024-3661. The security researchers note that this vulnerability has been available for exploitation by bad actors since at least 2002, but there are no known cases of active exploitation in the wild. Leviathan has informed many of the impacted vendors, as well as CISA and the EFF. The researchers have now publicly disclosed the issue along with a proof-of-concept exploit to raise awareness and compel VPN vendors to implement protection measures. Mitigating TunnelVision attacks Users are more apt to be impacted by "TunnelVision" attacks if they connect their device to a network that is either controlled by the attacker or where the attacker has a presence. Possible scenarios would include public Wi-Fi networks like those in coffee shops, hotels, or airports. The VPN on the targeted device must be susceptible to routing manipulation, which Leviathan says is typically the case with most VPN clients that use system-level routing rules without anti-leak safeguards. Finally, automatic DHCP configuration on the target device needs to be enabled, for the malicious DHCP configuration to be applied during network connection. This is, again, a commonly seen configuration. However, it should be noted that for this attack to work, a user must connect to the rogue DHCP server before the network's legitimate one. The researchers say attackers can increase the chance their rogue servers will be accessed first in multiple ways, including DHCP starvation attacks against the legitimate server and ARP spoofing. The TunnelVision CVE-2024-3661 flaw impacts Windows, Linux, macOS, and iOS. Due to Android not having support for DHCP option 121, it is the only major operating system not impacted by TunnelVision attacks. Leviathan proposes the following mitigations for VPN users: As for VPN providers, they are encouraged to enhance their client software to implement their own DHCP handlers or integrate additional security checks that would block applying risky DHCP configurations.

Daily Brief Summary

CYBERCRIME // TunnelVision Exploit Leaks VPN Traffic via Rogue DHCP Servers

A new cybersecurity threat named "TunnelVision" exposes VPN traffic by manipulating DHCP server settings.

Attackers can reroute VPN traffic to a local network or a malicious gateway, bypassing encryption and allowing data snooping.

The exploit utilizes DHCP option 121 to alter routing tables without authentication, compromising the intended secure VPN connection.

Leviathan Security has identified the issue, tracked as CVE-2024-3661, and has reported it to CISA, EFF, and impacted vendors.

Although the vulnerability has existed since 2002, there have been no reported active exploitations.

TunnelVision primarily affects users on public Wi-Fi networks where attackers can more easily implement rogue DHCP servers.

Devices running Windows, Linux, macOS, and iOS are vulnerable, while Android devices remain unaffected due to lack of DHCP option 121 support.

Leviathan Security suggests that VPN providers improve their software to resist such DHCP manipulations and users remain vigilant on public networks.