cve/2024/CVE-2024-3661.md

28 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-3661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3661)
![](https://img.shields.io/static/v1?label=Product&message=DHCP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-501%20Trust%20Boundary%20Violation&color=brighgreen)
### Description
DHCP can add routes to a clients routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
### POC
#### Reference
- https://news.ycombinator.com/item?id=40279632
- https://www.leviathansecurity.com/blog/tunnelvision
- https://www.leviathansecurity.com/research/tunnelvision
#### Github
2024-06-08 09:32:58 +00:00
- https://github.com/a1xbit/DecloakingVPN
2024-05-25 21:48:12 +02:00
- https://github.com/apiverve/news-API
- https://github.com/bollwarm/SecToolSet
2024-06-10 07:22:43 +00:00
- https://github.com/cyberspatiallabs/TunnelVision
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/leviathansecurity/TunnelVision
- https://github.com/tanjiti/sec_profile