First published: Mon May 06 2024(Updated: )
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
Credit: 9119a7d8-5eab-497f-8521-727c672e3725
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | >=6.4.0<7.2.5 | |
Fortinet FortiClient | >=6.4.0<7.2.5 | |
Fortinet FortiClient SSL VPN | >=6.4.0<7.2.5 | |
Fortinet FortiClient | =7.4.0 | |
Fortinet FortiClient | =7.4.0 | |
Fortinet FortiClient SSL VPN | =7.4.0 | |
Cisco AnyConnect Secure Mobility Client | ||
Cisco Secure Client | ||
Palo Alto Networks GlobalProtect for iOS | ||
Palo Alto Networks GlobalProtect | ||
Palo Alto Networks GlobalProtect | ||
Palo Alto Networks GlobalProtect Windows | ||
All of | ||
Citrix Secure Access Client | <24.06.1 | |
Any of | ||
iOS | ||
Apple iOS and macOS | ||
All of | ||
Citrix Secure Access Client | <24.8.5 | |
Linux Kernel | ||
F5 BIG-IP Access Policy Manager | >=7.2.3<=7.2.5 | |
F5 BIG-IP Access Policy Manager | >=15.1.0<=15.1.10 | |
F5 BIG-IP Access Policy Manager | >=16.1.0<=16.1.5 | |
F5 BIG-IP Access Policy Manager | >=17.1.0<=17.1.2 | |
WatchGuard IPSec Mobile VPN Client | ||
WatchGuard IPSec Mobile VPN Client for Windows | ||
WatchGuard Mobile VPN with SSL for MacOS | ||
WatchGuard Mobile VPN with SSL for Windows | ||
Zscaler Client Connector | <1.5.1.25 | |
Zscaler Client Connector | <4.2.0.282 | |
Zscaler Client Connector | >=3.7<3.7.0.134 | |
Zscaler Client Connector Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3661 is considered a high severity vulnerability that can lead to the leakage of VPN traffic.
To mitigate CVE-2024-3661, it is recommended to update affected software to the latest available versions that address this vulnerability.
CVE-2024-3661 affects various versions of Fortinet FortiClient, Cisco AnyConnect, Palo Alto Networks GlobalProtect, F5 BIG-IP Access Policy Manager, and more.
CVE-2024-3661 involves an attacker on the same local network using rogue DHCP servers to manipulate routing tables.
Yes, CVE-2024-3661 can potentially lead to data exposure due to the leakage of VPN traffic over unsecured networks.