Sunday, March 2, 2025
HomeCVE/vulnerabilityUnpatched "VPN Bypass" Vulnerability in Apple iOS Let Blocks VPN to Pass...

Unpatched “VPN Bypass” Vulnerability in Apple iOS Let Blocks VPN to Pass The Encrypted Traffic

Published on

SIEM as a Service

Follow Us on Google News

A new unpatched “VPN Bypass” vulnerability uncovered in Apple iOS block VPNs to encrypt all the traffic that passes through the device.

The bug affected Apple’s iOS version 13.4, and it can be taking advantage of the cybercriminals to surveillance the user’s online activities also it leaks IP address and exposes the user’s data.

Luis, a security consultant from ProtonVPN discovered this VPN bypass vulnerability and reported to Apple under which is now working for the patch.

ProtonVPN reported this VPN Bypass vulnerability under 90 days responsible disclosure program, and the iOS community will get the patch on the next Apple security update, currently no patch available for this vulnerability.

Also Learn: what is Virtual Private Network?

VPN Bypass Vulnerability Details

Basically, When users establish the connection via VPN, it kills the existing connection and re-establish the new connection via VPN tunnels where the connection will be completely encrypted.

But the vulnerability in the latest iOS version does not close existing connections plus some of the connections will be long-lasting and remain open for minutes to hours outside the VPN tunnel.

“One prominent example is Apple’s push notification service, which maintains a long-running connection between the device and Apple’s servers. But the problem could impact any app or service, such as instant messaging applications or web beacons.” Luis said via blog post.

VPN Bypass
Wireshark analysis

During the analysis of this iOS bug, the researcher captures the iOS device’s network traffic using Wireshark and be able to see the direct traffic between the iOS device’s IP and an external IP address that is not the VPN server but it’s an Apple server.

In fact, If you should be able to see only the traffic between the device’s IP and the VPN server but in this case, we could see the external IP address which belongs to Apple.

No VPN service can provide a workaround other than Apple for this issue due to the iOS permission restriction VPN app to kill existing network connections.

Learn : Master in Wireshark Network Analysis

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...