cve/2024/CVE-2024-3661.md

31 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-3661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3661)
![](https://img.shields.io/static/v1?label=Product&message=DHCP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-501%20Trust%20Boundary%20Violation&color=brighgreen)
### Description
DHCP can add routes to a clients routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
### POC
#### Reference
- https://news.ycombinator.com/item?id=40279632
- https://www.leviathansecurity.com/blog/tunnelvision
- https://www.leviathansecurity.com/research/tunnelvision
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/Roundthe-clock/CVE-2024-3661VPN
2024-06-08 09:32:58 +00:00
- https://github.com/a1xbit/DecloakingVPN
2024-05-25 21:48:12 +02:00
- https://github.com/apiverve/news-API
- https://github.com/bollwarm/SecToolSet
2024-06-10 07:22:43 +00:00
- https://github.com/cyberspatiallabs/TunnelVision
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
2025-09-29 16:08:36 +00:00
- https://github.com/i386x/pubdocs
2024-05-25 21:48:12 +02:00
- https://github.com/leviathansecurity/TunnelVision
2024-08-30 20:52:42 +00:00
- https://github.com/superit23/arcanetrickster
2024-05-25 21:48:12 +02:00
- https://github.com/tanjiti/sec_profile