CVE-2024-3661

Public on 2024-05-06
Modified on 2025-06-26
Description
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

Exploitation of this vulnerability requires the machine to be in a network with an untrusted DHCP server and the VPN in the host to allow for the DHCP-provided routes to manipulate the behavior of the unencrypted VPN.

Users are advised to mitigate this issue by either trusting their DHCP server, choosing a VPN solution with encrypts traffic end-to-end, or a VPN solution which doesn’t let the DHCP-provided routes take precedence over the VPN routes.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
5.0
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 libreswan No Fix Planned
Amazon Linux 2 - Core libreswan No Fix Planned
Amazon Linux 2023 libreswan No Fix Planned
Amazon Linux 1 openswan No Fix Planned
Amazon Linux 1 openvpn No Fix Planned
Amazon Linux 2023 openvpn No Fix Planned
Amazon Linux 1 pptp No Fix Planned
Amazon Linux 2 - Core pptp No Fix Planned
Amazon Linux 1 vpnc No Fix Planned

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
NVD CVSSv3 7.6 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L