Sunday, December 3, 2023

Unpatched “VPN Bypass” Vulnerability in Apple iOS Let Blocks VPN to Pass The Encrypted Traffic

A new unpatched “VPN Bypass” vulnerability uncovered in Apple iOS block VPNs to encrypt all the traffic that passes through the device.

The bug affected Apple’s iOS version 13.4, and it can be taking advantage of the cybercriminals to surveillance the user’s online activities also it leaks IP address and exposes the user’s data.

Luis, a security consultant from ProtonVPN discovered this VPN bypass vulnerability and reported to Apple under which is now working for the patch.

ProtonVPN reported this VPN Bypass vulnerability under 90 days responsible disclosure program, and the iOS community will get the patch on the next Apple security update, currently no patch available for this vulnerability.

Also Learn: what is Virtual Private Network?

VPN Bypass Vulnerability Details

Basically, When users establish the connection via VPN, it kills the existing connection and re-establish the new connection via VPN tunnels where the connection will be completely encrypted.

But the vulnerability in the latest iOS version does not close existing connections plus some of the connections will be long-lasting and remain open for minutes to hours outside the VPN tunnel.

“One prominent example is Apple’s push notification service, which maintains a long-running connection between the device and Apple’s servers. But the problem could impact any app or service, such as instant messaging applications or web beacons.” Luis said via blog post.

VPN Bypass
Wireshark analysis

During the analysis of this iOS bug, the researcher captures the iOS device’s network traffic using Wireshark and be able to see the direct traffic between the iOS device’s IP and an external IP address that is not the VPN server but it’s an Apple server.

In fact, If you should be able to see only the traffic between the device’s IP and the VPN server but in this case, we could see the external IP address which belongs to Apple.

No VPN service can provide a workaround other than Apple for this issue due to the iOS permission restriction VPN app to kill existing network connections.

Learn : Master in Wireshark Network Analysis


Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles