vulnerability
Red Hat: CVE-2024-3661: DHCP: DHCP routing options can manipulate interface-based VPN traffic (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:A/AC:L/Au:N/C:C/I:P/A:P) | May 6, 2024 | Jan 15, 2025 | Sep 24, 2025 |
Severity
7
CVSS
(AV:A/AC:L/Au:N/C:C/I:P/A:P)
Published
May 6, 2024
Added
Jan 15, 2025
Modified
Sep 24, 2025
Description
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-networkmanagerredhat-upgrade-networkmanager-adslredhat-upgrade-networkmanager-adsl-debuginforedhat-upgrade-networkmanager-bluetoothredhat-upgrade-networkmanager-bluetooth-debuginforedhat-upgrade-networkmanager-cloud-setupredhat-upgrade-networkmanager-cloud-setup-debuginforedhat-upgrade-networkmanager-config-connectivity-redhatredhat-upgrade-networkmanager-config-serverredhat-upgrade-networkmanager-debuginforedhat-upgrade-networkmanager-debugsourceredhat-upgrade-networkmanager-dispatcher-routing-rulesredhat-upgrade-networkmanager-initscripts-updownredhat-upgrade-networkmanager-libnmredhat-upgrade-networkmanager-libnm-debuginforedhat-upgrade-networkmanager-libnm-develredhat-upgrade-networkmanager-ovsredhat-upgrade-networkmanager-ovs-debuginforedhat-upgrade-networkmanager-pppredhat-upgrade-networkmanager-ppp-debuginforedhat-upgrade-networkmanager-teamredhat-upgrade-networkmanager-team-debuginforedhat-upgrade-networkmanager-tuiredhat-upgrade-networkmanager-tui-debuginforedhat-upgrade-networkmanager-wifiredhat-upgrade-networkmanager-wifi-debuginforedhat-upgrade-networkmanager-wwanredhat-upgrade-networkmanager-wwan-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.