Thursday, April 3, 2025
HomeCVE/vulnerabilityUnpatched "VPN Bypass" Vulnerability in Apple iOS Let Blocks VPN to Pass...

Unpatched “VPN Bypass” Vulnerability in Apple iOS Let Blocks VPN to Pass The Encrypted Traffic

Published on

SIEM as a Service

Follow Us on Google News

A new unpatched “VPN Bypass” vulnerability uncovered in Apple iOS block VPNs to encrypt all the traffic that passes through the device.

The bug affected Apple’s iOS version 13.4, and it can be taking advantage of the cybercriminals to surveillance the user’s online activities also it leaks IP address and exposes the user’s data.

Luis, a security consultant from ProtonVPN discovered this VPN bypass vulnerability and reported to Apple under which is now working for the patch.

ProtonVPN reported this VPN Bypass vulnerability under 90 days responsible disclosure program, and the iOS community will get the patch on the next Apple security update, currently no patch available for this vulnerability.

Also Learn: what is Virtual Private Network?

VPN Bypass Vulnerability Details

Basically, When users establish the connection via VPN, it kills the existing connection and re-establish the new connection via VPN tunnels where the connection will be completely encrypted.

But the vulnerability in the latest iOS version does not close existing connections plus some of the connections will be long-lasting and remain open for minutes to hours outside the VPN tunnel.

“One prominent example is Apple’s push notification service, which maintains a long-running connection between the device and Apple’s servers. But the problem could impact any app or service, such as instant messaging applications or web beacons.” Luis said via blog post.

VPN Bypass
Wireshark analysis

During the analysis of this iOS bug, the researcher captures the iOS device’s network traffic using Wireshark and be able to see the direct traffic between the iOS device’s IP and an external IP address that is not the VPN server but it’s an Apple server.

In fact, If you should be able to see only the traffic between the device’s IP and the VPN server but in this case, we could see the external IP address which belongs to Apple.

No VPN service can provide a workaround other than Apple for this issue due to the iOS permission restriction VPN app to kill existing network connections.

Learn : Master in Wireshark Network Analysis

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall...

Google’s Quick Share for Windows Vulnerability Allows Remote Code Execution

Cybersecurity researchers from SafeBreach Labs have revealed new vulnerabilities in Google’s Quick Share file-transfer...