cve/2024/CVE-2024-3661.md
2025-09-29 16:08:36 +00:00

31 lines
1.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-3661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3661)
![](https://img.shields.io/static/v1?label=Product&message=DHCP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%20Missing%20Authentication%20for%20Critical%20Function&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-501%20Trust%20Boundary%20Violation&color=brighgreen)
### Description
DHCP can add routes to a clients routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
### POC
#### Reference
- https://news.ycombinator.com/item?id=40279632
- https://www.leviathansecurity.com/blog/tunnelvision
- https://www.leviathansecurity.com/research/tunnelvision
#### Github
- https://github.com/Roundthe-clock/CVE-2024-3661VPN
- https://github.com/a1xbit/DecloakingVPN
- https://github.com/apiverve/news-API
- https://github.com/bollwarm/SecToolSet
- https://github.com/cyberspatiallabs/TunnelVision
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/i386x/pubdocs
- https://github.com/leviathansecurity/TunnelVision
- https://github.com/superit23/arcanetrickster
- https://github.com/tanjiti/sec_profile