team of researchers warns that VPNs are affected by a vulnerability that can be exploited to launch man-in-the-middle (MitM) attacks, enabling threat actors to intercept and redirect traffic

attack technique, named Port Shadow and tracked as CVE-2021-3773, builds on research first presented by Benjamin Mixon-Baca and Jedidiah R. Crandall back in 2021

breakpointingbad.com/2021/09/0

paper detailing the research was published this week

(PDF URL)

petsymposium.org/popets/2024/p

@corlin yup

vulnerability affects OpenVPN, WireGuard, and OpenConnect running on Linux or FreeBSD. FreeBSD is less vulnerable

"We found that Linux/Netfilter + (OpenVPN and WireGuard), which a large fraction of VPN services use, has the highest susceptibility to these attacks regardless of client platform (PC, Android, and iOS)"

@ecksmc
I have a ticket into Proton VPN.
I will let you know when they reply. Nothing yet on their blog, or notes.

They exclusively use wireguard.

@corlin yeah most VPN providers do prefer wireguard these days

easiest option for users is to use a protocol such as ShadowSocks or Tor....that's the recommended advice

Port scanning can be partially mitigated on Linux desktops using network namespaces

github.com/slingamn/namespaced

I'm using Mulvard VPN wireguard also

@corlin ironically mulvard's last blog post is

Fourth Infrastructure audit completed by Cure53

We asked Cure53 to focus solely on one OpenVPN and one WireGuard server.

mullvad.net/en/blog/fourth-inf

😆😂😂

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.