TunnelVision
TunnelVision
On May 6, 2024 a new attack against VPN clients using DHCP was released by researchers at Leviathan Security. Popularly known as TunnelVision, it is being tracked as CVE-2024-3661. The attack relies on manipulating the way the operating system routes traffic over the available network interfaces.
TunnelVision impacts the behavior of Secure Access clients in the following ways:
- On Windows: Not vulnerable to exploit
- On Android: Not vulnerable to exploit
- On iOS and macOS: When used in per-app mode, the Apple clients are not vulnerable to the exploit. When used in standard mode, the Apple clients are not vulnerable to the specific exploit in the published paper, however we are investigating possible vulnerabilities in related attack methods. Therefore, we recommend that customers consider implementing per-app mode for their Apple platforms.
If you have any additional questions about TunnelVision or have other security concerns, please contact [email protected]