TunnelVision attack against VPNs breaks anonymity and bypasses encryption
Researchers from Leviathan Security have discovered a new vulnerability that affects virtual private networks (VPNs) on most platforms.
VPNs serve multiple purposes. They encrypt all traffic when connected to a VPN server to prevent eavesdropping and tampering. VPNs furthermore help users stay anonymous, as the VPNs IP address is revealed to websites and services.
TunnelVision is a new attack that manipulates traffic using rogue DHCP servers. All of this happens without dropping of the VPN connection or kill-switch functionality taking note and blocking all Internet connectivity. For the user, the VPN connection appears to work without issues.
TunnelVision Fact Sheet
- Works on all major platforms except for Android.
- A potential fix could be developed for Linux.
- Requires a rogue DHCP server.
- Vulnerability could date back to 2002.
TunnelVision in action
The attack requires access to a DHCP server that the target's device communicates with. The core purpose of DHCP servers is to provide and assign IP addresses to client devices.
DHCP servers support a preference called option code 121, which the attack uses to route the traffic of the target's device through the DHCP server.
The researches explain: "Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway. When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it."
For the attack to work, it is necessary that the target accepts "a DHCP lease" from the rogue DHCP server and that option 121 is implemented. The researches note that attackers who are on the same network as the target may "become their DHCP server" using a number of attack techniques.
Having administrative control over the network is another possibility to attack users who use VPNs to protect their data.
Some or all of a target's traffic may be routed through the unencrypted channel. The VPN program or app continues to report that all data is protected, even while that is not the case.
A proof of concept video was published on YouTube:
Potential fixes for the issue
The technical blog post lists several potential fixes or mitigations. Not all are without problems, however:
- Network Namespaces -- The feature could fix the vulnerability on Linux, but it "less commonly implemented".
- Firewall rules -- Denying all inbound and outbound traffic to and from the physical interface using firewall rules. This introduces " selective denial of service for traffic using the DHCP route" and "a side-channel".
- Ignore Option 121 -- A potential mitigation is to ignore option 121 while VPN connections are active. Android does not support the option at all, which is why it is unaffected by the vulnerability. This must be implemented on the OS level.
- Use of a hotspot or virtual machine -- Hotspots or virtual machines mitigate the vulnerability, as the attacker does not have access to this temporary network.
What about you? Do you use VPNs frequently or regularly?
RECOMMENDED NEWS
You may now hide embarrassing games on Steam
Steam users may hide embarrassing games on Steam soon from prying eyes of friends by setting their ...
MSEdgeRedirect's Europe Mode sets your Windows region to Europe
In the coming months, Windows users from many European countries will be allowed to remove Microsof...
Windows Updates will be smaller after the release of Windows 11 version 24H2
Microsoft announced a fundamental change to Windows Updates. The built-in service delivers updates ...
World's Top 200 Common Passwords continue to be incredibly weak
Weak passwords continue to be a problem on today's Internet. It seems that many users continue to p...
Outlook for Mac Finally Gets This Long-Awaited Email Recall Feature
Microsoft has officially brought the long-awaited Recall emails feature to Outlook for Mac, a stapl...
Rockstar drops a new trailer for GTA 6 along details about the characters, map and more
In a recent announcement, Rockstar Games confirmed a delay in the highly anticipated launch of Gran...
Comments on "TunnelVision attack against VPNs breaks anonymity and bypasses encryption" :