The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0015 | |
https://tunnelcrack.mathyvanhoef.com/details.html | Exploit Third Party Advisory |
https://wireguard.com | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-08-09 23:15
Updated : 2023-10-31 09:15
NVD link : CVE-2023-35838
Mitre link : CVE-2023-35838
CVE.ORG link : CVE-2023-35838
JSON object : View
Products Affected
wireguard
- wireguard
microsoft
- windows
CWE
CWE-610
Externally Controlled Reference to a Resource in Another Sphere