Overview

Research by Top10VPN and KU Leuven has uncovered critical vulnerabilities in multiple tunneling protocols affecting **4.2 million hosts** globally. The flaws enable attackers to perform anonymous attacks and gain unauthorized network access through IP6IP6, GRE6, 4in6, and 6in4

Whom it may concern

  • Network administrators managing VPN infrastructure
  • ISP operators handling home router deployments
  • Security teams responsible for CDN nodes
  • Organizations using mobile network gateways
  • Core internet router maintainers

Key Findings

  1. Lack of authentication in tunneling protocols
  1. Assigned CVEs for systematic tracking: CVE-2024-7595, CVE-2024-7596
  1. Potential for DDoS attacks and network infiltration
  1. Most affected countries: China, France, Japan, US, Brazil

Risk Analysis

  • Probability: High (widespread exposure of 4.2M hosts)
  • Impact: Critical (network disruption, data interception)
  • Attack complexity: Low (simple packet manipulation)
  • Required privileges: None (external attack vector)

Action Items

  • Implement IPSec or WireGuard for tunnel encryption
  • Deploy Deep Packet Inspection (DPI) systems
  • Configure traffic filtering on routers
  • Block unencrypted tunneling packets
  • Restrict tunnel acceptance to trusted sources

Sources

  • [The Hacker News](https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html)
Share this article

Stay up to date

Join my community and receive the latest risk news and trends.