First published: Wed Aug 09 2023(Updated: )
The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WireGuard | =0.5.3 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35838 has been assessed as a high severity vulnerability due to its potential impact on network traffic and security.
To mitigate CVE-2023-35838, you should update the WireGuard client to a version that resolves this configuration issue.
CVE-2023-35838 specifically affects the WireGuard client version 0.5.3 on Windows systems.
CVE-2023-35838 allows an attacker to block legitimate IP traffic to specified addresses, disrupting normal network connectivity.
Currently, the best workaround for CVE-2023-35838 is to avoid using WireGuard client version 0.5.3 until the issue is patched.