7.6
CWE
306 501
EPSS
0.047%
Advisory Published
Updated

CVE-2024-3661: DHCP routing options can manipulate interface-based VPN traffic

First published: Mon May 06 2024(Updated: )

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

Credit: 9119a7d8-5eab-497f-8521-727c672e3725

Affected SoftwareAffected VersionHow to fix
Fortinet FortiClient>=6.4.0<7.2.5
Fortinet FortiClient>=6.4.0<7.2.5
Fortinet FortiClient SSL VPN>=6.4.0<7.2.5
Fortinet FortiClient=7.4.0
Fortinet FortiClient=7.4.0
Fortinet FortiClient SSL VPN=7.4.0
Cisco AnyConnect Secure Mobility Client
Cisco Secure Client
Palo Alto Networks GlobalProtect for iOS
Palo Alto Networks GlobalProtect
Palo Alto Networks GlobalProtect
Palo Alto Networks GlobalProtect Windows
All of
Citrix Secure Access Client<24.06.1
Any of
iOS
Apple iOS and macOS
All of
Citrix Secure Access Client<24.8.5
Linux Kernel
F5 BIG-IP Access Policy Manager>=7.2.3<=7.2.5
F5 BIG-IP Access Policy Manager>=15.1.0<=15.1.10
F5 BIG-IP Access Policy Manager>=16.1.0<=16.1.5
F5 BIG-IP Access Policy Manager>=17.1.0<=17.1.2
WatchGuard IPSec Mobile VPN Client
WatchGuard IPSec Mobile VPN Client for Windows
WatchGuard Mobile VPN with SSL for MacOS
WatchGuard Mobile VPN with SSL for Windows
Zscaler Client Connector<1.5.1.25
Zscaler Client Connector<4.2.0.282
Zscaler Client Connector>=3.7<3.7.0.134
Zscaler Client Connector Windows

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-3661?

    CVE-2024-3661 is considered a high severity vulnerability that can lead to the leakage of VPN traffic.

  • How do I fix CVE-2024-3661?

    To mitigate CVE-2024-3661, it is recommended to update affected software to the latest available versions that address this vulnerability.

  • What software is affected by CVE-2024-3661?

    CVE-2024-3661 affects various versions of Fortinet FortiClient, Cisco AnyConnect, Palo Alto Networks GlobalProtect, F5 BIG-IP Access Policy Manager, and more.

  • What type of attack does CVE-2024-3661 involve?

    CVE-2024-3661 involves an attacker on the same local network using rogue DHCP servers to manipulate routing tables.

  • Can CVE-2024-3661 lead to data exposure?

    Yes, CVE-2024-3661 can potentially lead to data exposure due to the leakage of VPN traffic over unsecured networks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203