VPN Vulnerability "Port Fail" Reveals User's Real IP Address

Exterminator

Community Manager
Thread author
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Attackers can unmask users hidden under a VPN connection
A vulnerability into how VPN providers deal with port forwarding exposes the real IP address of some users, say the network security experts from Perfect Privacy, a VPN provider.

According to their research, some conditions must be met for this to happen, but none of them is so out of the ordinary that attackers could not easily satisfy it.

Special conditions are needed for the attack to work
First, the VPN provider must allow users to enable port forwarding on their VPN account, which most do. Only the attacker must enable the port forwarding feature, not the victim.

The attacker must know the exit IP address of the victim, which can easily be acquired via public IRCs, torrent connections, or by tricking the user into accessing a website under the attacker's control.

The last condition is that the attacker must set up a VPN account on the same provider as the victim, which is easily doable if the attacker knows the exit IP address.

The attack is possible due to an issue with the VPN's internal routing table. If the attacker can make the victim access a resource (image embedded on a site) hosted on the same VPN server, due to the internal routing table and the port forwarding setting, the attacker can learn the victim's real IP address.

Perfect Privacy says that it tested this attack scenario with nine of today's biggest VPN providers, and five of them were vulnerable. They were notified of the issue so that they could start working on fixes.

VPN port forwarding issues affect all VPN protocols
Because the issue works on the lower network level of the OSI model, VPN protocols like OpenVPN, PPTP, or IPSec are inherently affected.

Perfect Privacy recommends that VPN providers use multiple IP addresses and allow incoming connections to IP1 to exit connections through IP2-IPx, while having port forwarding on IP2-IPx, not IP1. Basically, they should use a Man-in-the-Middle IP for port forwarding operations.

Additionally, VPN providers should also use a server-side firewall to block access from a client's real IP to any port-forwarded connection that is not their own.

Since there are hundreds of VPN providers online, many of them are bound to be affected by this issue.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top