• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

Atlas VPN 0-Day Disconnects Client and Leaks User’s IP Address

September 5, 2023 By Heinrich Long — 1 Comment
atlas VPN

Update: Atlas VPN released a security patch for the Linux client shortly after this story broke. The latest Linux update is not susceptible to this vulnerability.

An anonymous user has leaked a zero-day vulnerability on Reddit that can force-disconnect the Linux client of Atlas VPN and reveal the user’s actual IP address.

Atlas VPN is a budget VPN service with a good set of everyday-use features, albeit limited by a small server network and the fact that it is based in a “Five Eyes” country (United States), making it susceptible to data scrutiny from the authorities. To learn more about the product and its strengths and weaknesses, read our full review.

The Reddit user has posted a code snippet that can be uploaded to any web server, and if the target (Atlas VPN user) visits the website and their browser runs the code, the vulnerability is triggered.

The anonymous researcher said there are no reports of the disclosed method being used in the wild, but since the disclosure of the exploit code, this could change swiftly. The fact that this vulnerability is a zero-day means that Atlas VPN has not addressed the security problem, and hackers or anyone with malicious intentions can readily exploit it.

The researcher has provided a short explanation about the root cause of the vulnerability, which is a lack of authentication on the API exposed on the user’s localhost at port 8076. This allows any program, including the target’s web browser, to send requests to this port and interfere with Atlas VPN operation. The demonstrated malicious script forces the target’s browser to send a POST request to the port that stops the connection, followed by a second request that retrieves the user’s real IP address.

Compromising a user’s IP address is a critical flaw for a VPN, given its fundamental purpose is to conceal this information. By doing so, the user’s location and identity are exposed, especially since IP addresses can be traced back to individuals through their internet service providers.

The vulnerability has been verified by other security researchers who explained that the security problem arises from “simple requests” being exempted from CORS (cross-origin resource sharing) checks on the browser to help maintain backward compatibility. Because the exploit proof of concept creates a request for the Atlas VPN daemon that mimics a form submission, it’s seen as a “simple request,” hence the browser’s security is bypassed, and the request is accepted and processed as normal.

Disconnecting Atlas VPN and exposing the user’s IP address via a POST request
Chris Partridge

Regarding why the Reddit user chose to publicly reveal the vulnerability rather than discreetly inform Atlas VPN, the individual claims they tried reaching out to the company without success. Moreover, their trust in Atlas VPN is shaky, as they expressed skepticism, stating, “It’s hard to believe this is a bug rather than a backdoor.”

Atlas VPN’s Head of IT jumped on the Reddit thread to confirm the vulnerability and also explain what they’re doing about it.

Atlas VPN Zero Day

RestorePrivacy has contacted Atlas VPN to request a comment on the disclosed exploit code and whether the VPN service provider plans a fixing update for its Linux clients soon, and a spokesperson has sent the following statement:

We’re aware of the security vulnerability that affects our Linux client. We take security and user privacy very seriously. Therefore, we’re actively working on fixing it as soon as possible. Once resolved, our users will receive a prompt to update their Linux app to the latest version.

The vulnerability affects Atlas VPN Linux client version 1.0.3. As the researcher stated, due to the vulnerability, the application and, hence, encrypted traffic between a user and the VPN gateway can be disconnected by a malicious actor. This could lead to the user’s IP address disclosure.

We greatly appreciate the cybersecurity researchers’ vital role in identifying and addressing security flaws in systems, which helps safeguard against potential cyberattacks, and we thank them for bringing this vulnerability to our attention. We will implement more security checks in the development process to avoid such vulnerabilities in the future. Should anyone come across any other potential threats related to our service, please contact us via security@atlasvpn.com.

– Atlas VPN statement to RestorePrivacy

Update: Atlas VPN releases latest patched version for Linux

Atlas VPN provided ResotrePrivacy with the following update:

As of September 18th, 2023, the vulnerability is no longer present on the Linux app since its latest version. Following this resolution, we informed our users to update their applications to the fixed 1.1 version. Moreover, the Linux application is now available for download again on our website. We are actively refining our internal communication processes and establishing a more structured vulnerability reporting mechanism. We are committed to ensuring that such oversights do not recur.

– Atlas VPN statement to RestorePrivacy

Related articles:

  • Google Reveals Attack Chains Used in Spyware Campaigns
  • CyberGhost VPN for Windows Vulnerable to Command Injection
  • New Version of DarkGate Malware Spread via SEO Poisoning

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. Riley R.

    September 5, 2023

    Vulns are always going to be there and zero days are going to exist as long as computers exist. Their slow response is an obvious negative, but them acting on it now is a good thing.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP