"'TunnelVision' DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic"
Attackers can manipulate routing tables to bypass traffic meant for a Virtual Private Network (VPN) and redirect it to an untrusted local network using a technique called "TunnelVision." It involves the exploitation of a Dynamic Host Configuration Protocol (DHCP) design flaw. According to researchers at the Leviathan Security Group, this technique does not rely on exploiting VPN technologies or underlying protocols. Instead, it works entirely independently of the VPN provider or implementation. This article continues to discuss the potential exploitation and impact of the TunnelVision DHCP flaw.
SC Magazine reports "'TunnelVision' DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic"
Submitted by grigby1
Submitted by Gregory Rigby
on