Description
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
CVSS Metrics
- Vector
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
- Attack Vector
- adjacent network
- Complexity
- low
- Privileges
- none
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- low
- Availability
- low
- Weaknesses
- CWE-306CWE-501CWE-306
Metadata
- Primary Vendor
- FORTINET
- Published
- 5/6/2024
- Last Modified
- 1/15/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
fortinet : forticlientfortinet : forticlientfortinet : forticlientfortinet : forticlientfortinet : forticlientfortinet : forticlientcisco : anyconnect_vpn_clientcisco : secure_clientpaloaltonetworks : globalprotectpaloaltonetworks : globalprotectpaloaltonetworks : globalprotectpaloaltonetworks : globalprotectcitrix : secure_access_clientcitrix : secure_access_clientf5 : big-ip_access_policy_managerf5 : big-ip_access_policy_managerf5 : big-ip_access_policy_managerf5 : big-ip_access_policy_managerwatchguard : ipsec_mobile_vpn_clientwatchguard : ipsec_mobile_vpn_clientwatchguard : mobile_vpn_with_sslwatchguard : mobile_vpn_with_sslzscaler : client_connectorzscaler : client_connectorzscaler : client_connectorzscaler : client_connector
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.