Lucene search

K
cvelistCisa-cgCVELIST:CVE-2024-3661
HistoryMay 06, 2024 - 6:31 p.m.

CVE-2024-3661 DHCP routing options can manipulate interface-based VPN traffic

2024-05-0618:31:21
CWE-306
CWE-501
cisa-cg
www.cve.org
2
cve-2024-3661
dhcp
routing options
interface-based vpn
security solutions
local network
traffic leak
network traffic.

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "DHCP",
    "vendor": "IETF",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  }
]

References

7.6 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.3%

Related for CVELIST:CVE-2024-3661