Detecting a new Linux vulnerability allows hackers to gain control of the VPN connection
International security researchers have found an entirely new Linux vulnerability that allows potential attackers to hijack VPN connections on the device * NIX and 'inject' the arbitrary data payload into it. TCP4 and IPv6 streams.
This security flaw is currently being tracked with the identifier CVE-2019-14899, which is directly related to Linux distributions and kernel security groups, as well as a number of other affected groups such as Systemd, Google, Apple, OpenVPN and WireGuard. More specifically, the flaw affects most Linux distributions as well as Unix-like operating systems including FreeBSD, OpenBSD, macOS, iOS and Android. Below is a list (incomplete) of the operating systems vulnerable to the vulnerabilities as well as the init systems they come with:
- Ubuntu 19.10 (systemd)
- Fedora (systemd)
- Debian 10.2 (systemd)
- Arch 2019.05 (systemd)
- Manjaro 18.1.1 (systemd)
- Devuan (sysV init)
- MX Linux 19 (Mepis + antiX)
- Void Linux (runit)
- Slackware 14.2 (rc.d)
- Deepin (rc.d)
- FreeBSD (rc.d)
- OpenBSD (rc.d)
All VPN deployment models are affected
According to the findings of experts from the University of New Mexico, this security flaw "allows an attacker to determine which objects are connecting to the VPN, the virtual IP address assigned by the VPN server, and whether or not the connection is compatible with a particular website, and the vulnerability also allows hackers to determine the exact number of seq and ack by counting encrypted packets, or checking their size. This allows them to push data into the TCP stream and gain control.
These CVE-2019-14899 exploits are primarily against OpenVPN, WireGuard and IKEv2 / IPSec, and most likely with Tor. In addition, nearly all Linux distributions using the systemd version with the default configuration are vulnerable.
Below are the necessary steps that a hacker uses to launch an attack to exploit the CVE-2019-14899 vulnerability and hijack the target VPN connection:
- Determine the virtual IP address of the VPN client.
- Use virtual IP addresses to infer information about active connections.
- Use encrypted replies for unsolicited packets to identify the sequence and confirmation number of an active connection in order to hijack a TCP session.
The team is planning to publish an in-depth analysis of this vulnerability as well as its implications after finding the most optimal response.
You should read it
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distros
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- 12-year vulnerability in pkexec gives hackers root privileges on Linux
- The Linux vulnerability series is more than '15 years old', allowing hackers to hijack root privileges
- How to install and use a vulnerability scanner in Linux
- Linux kernel vulnerability exposes Stack memory, causing local data leak
- Apple releases iOS 14.4.2, iOS 12.5.2, and watchOS 7.3.3 updates that patch the critical zero-day vulnerability
- The DHCP vulnerability in Red Hat Linux helps hackers execute remote code
- Detected critical zero-day vulnerability on Adobe Reader
- Google discovered two serious vulnerabilities on iOS
- The security feature prevents the Specter vulnerability, which makes Chrome account for 10-13% more computer RAM
- Hackers start using SambaCry to attack Linux computers