vulnerability
Ubuntu: (CVE-2023-35838): openconnect vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:M/Au:N/C:N/I:N/A:C) | Aug 9, 2023 | Jun 26, 2025 | Aug 18, 2025 |
Severity
6
CVSS
(AV:A/AC:M/Au:N/C:N/I:N/A:C)
Published
Aug 9, 2023
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard.
Solution
no-fix-ubuntu-package
References
- CVE-2023-35838
- https://attackerkb.com/topics/CVE-2023-35838
- CWE-610
- URL-https://openvpn.net/security-advisory/statement-regarding-tunnelcrack-vulnerabilities/
- URL-https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf
- URL-https://tunnelcrack.mathyvanhoef.com/details.html
- URL-https://www.cve.org/CVERecord?id=CVE-2023-35838
- URL-https://www.softether.org/9-about/News/905-TunnelCrack
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.