• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

New TunnelCrack Attack Diverts VPN Traffic Outside the Protected Tunnel

August 9, 2023 By Heinrich Long — 8 Comments
New TunnelCrack Attack Diverts VPN Traffic Outside the Protected Tunnel

Researchers from New York University and KU Leuven have developed two new attacks collectively named ‘TunnelCrack’ that can cause a broad range of VPN clients to leak user traffic outside the protected encryption tunnels.

The two attacks, ‘LocalNet’ and ‘ServerIP,’ stem from how VPN clients configure the underlying OS to route traffic through VPN tunnels by updating the system’s IP routing tables. The OS retains some exceptions for local network communications and for direct data exchange between the VPN client and the VPN server. The researchers discovered that it’s possible to manipulate exceptions in the routing scheme by using spoofed DNS responses and rogue WiFi access points, achieving unencrypted network traffic leak even when a VPN connection is active.

Through extensive testing and experimentation on 66 VPN products and five operating system platforms, the university researchers found that all of them are vulnerable to TunnelCrack in at least one case. The researchers presented the full details of their discovery in a technical paper on USENIX Security.

LocalNet Attack

LocalNet attack requires the adversary to set up a malicious WiFi access point and entice victims to connect. Once this happens, the attacker assigns them a public IP address and subnet such that all external website addresses will appear to the client as reachable in the local network.

Because most VPNs allow direct access to the local network, setting this as an exception to the routing table, the traffic generated under these conditions is not passed through the encrypting tunnels.

LocalNet attack diagram
tunnelcrack.mathyvanhoef.com

This problem was given the identifier CVE-2023-36672, carrying a CVSS score of 6.8, mitigated mainly by the fact that the attacker has to have LAN access or be in WiFi range to launch the attack. Even then, the victim must be tricked into connecting to the rogue access point using a deceptive SSID.

ServerIP Attack

The ServerIP attack exploits a design flaw present in many VPNs, which do not encrypt traffic destined to directly reach the VPN server for speed and computational resource usage efficiency. The attack requires setting up a rogue WiFi hotspot again or hijacking the target’s local area network.

Next, the attacker exploits the non-tunneled communication between the VPN client and the VPN server to redirect DNS requests to a server under their control. Hence, whenever the user tries to connect to the service’s legitimate VPN server, they will instead link to the attacker’s server, allowing them to intercept network traffic and capture secrets.

ServerIP attack diagram
tunnelcrack.mathyvanhoef.com

It is essential to note that the captured data remains encrypted in this case, so deciphering it might be challenging depending on how strong the encryption used by the particular VPN product is. However, even if the intercepted traffic remains protected, the attacker can still manipulate the data exchange and inject malware or other malicious payloads in the stream destined for the user’s device.

This issue that can leak user traffic to arbitrary IP addresses is tracked as CVE-2023-36673 and has a severity rating of 7.4 under the CVSS scoring system.

TunnelCrack Impact

LocalNet attack was found to impact all VPN apps on iOS, all VPN clients except for one on macOS, the majority of the tested VPNs on Windows, and over one-third of VPNs on Linux. Android was the safest platform in terms of impact by LocalNet, with roughly 21% of the VPN apps found to be susceptible.

VPN clients impacted by LocalNet
tunnelcrack.mathyvanhoef.com

The most definitive solution to LocalNet attacks is to automatically disable local network access if public IP addresses are used, which should prevent the misrouting of traffic outside the VPN tunnel.

Regarding ServerIP, the researchers have not provided statistics about the impact of this attack on the tested VPN products, so that part remains unclear. In terms of mitigation, the recommended actions include using DNS over HTTPS (DoH) or DNS over TLS (DoT), which encrypt and protect the DNS queries from tampering.

In general, users should only connect to trusted WiFi networks, avoid unknown public hotspots, and beware of spoofed access points that appear as duplicates in the scan list.

At this time, there are no known reports of active exploitation of ‘TunnelCrack,’ however, this could change following the full disclosure of the issues. The security researchers have shared instructions on how to manually test VPN clients on GitHub, which aspiring attackers could use to develop effective data-stealing attacks against specific targets.

VPN users are advised to keep their clients up to date and apply the available security updates as soon as those are released, across all their devices and platforms.

Related Articles:

  • Signal for Desktop is Vulnerable to Attachments Exposure
  • Best VPNs with Split Tunneling
  • German State Grants Tutanota €1.5M for Post-Quantum Secure Cloud
  • Latest iOS Found to Bypass VPN Connection for Some Services
  • NordVPN Review

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. Hmm

    August 10, 2023

    FEAR MONGERING.

    “We at Mullvad have been aware of this for a long time but not considered it a practical or important attack vector in the scope of being fixed by a VPN app. If an attacker controls the router/AP, which they need to do to perform this attack, they can block any traffic from the victim’s device anyway. We do not believe that being able to do it selectively for certain IP ranges changes anything significant. Any device that is configured in such a way that it connects to unauthenticated (the only type that can be spoofed like this) WiFi access points is susceptible to denial of service attacks, period”

    Reply
  2. ghestara

    August 9, 2023

    Oh and this want already mentioned by Mullvad on their blog.

    https://mullvad.net/en/blog/2023/8/9/response-to-tunnelcrack-vulnerability-disclosure/

    Reply
  3. Antredoa

    August 9, 2023

    Mullvad seems to be overall most secure option against this, check PDF with list of VPNs.

    Reply
    • JuhaT

      August 10, 2023

      Yeah, Mullvad is very secure and fast. The only problem I have with it is its users. Mullvad is by far the most captcha strucken VPN out there. No other VPN attrackts captchas like Mullvad.

      Reply
    • Agreed

      August 10, 2023

      I’m sick of people pretending Mullvad is perfect, and if you don’t agree, you are an evil shill.
      Mullvad sucks when it comes to streaming, and it also has lots of CAPTCHA problems, which is a major issue for everyday use, as others have pointed out here in the comments. I think it’s strong in the privacy and security areas, but that’s about it.

      Reply
      • Riley

        August 20, 2023

        Yes, I agree.

        Reply
  4. User

    August 9, 2023

    Excellent research. Another reason for not to use wifi, better with an ethernet cable. Thanks Heinrich!

    Reply
    • Onion

      August 10, 2023

      Lol. What research, kiddo? I don’t see Heinrich’s name in the study.

      But do tell if Samsung or Huawei partly funded the study which isn’t peer reviewed.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP