Overview
Research by Top10VPN and KU Leuven has uncovered critical vulnerabilities in multiple tunneling protocols affecting **4.2 million hosts** globally. The flaws enable attackers to perform anonymous attacks and gain unauthorized network access through IP6IP6, GRE6, 4in6, and 6in4
Whom it may concern
- Network administrators managing VPN infrastructure
- ISP operators handling home router deployments
- Security teams responsible for CDN nodes
- Organizations using mobile network gateways
- Core internet router maintainers
Key Findings
- Lack of authentication in tunneling protocols
- Assigned CVEs for systematic tracking: CVE-2024-7595, CVE-2024-7596
- Potential for DDoS attacks and network infiltration
- Most affected countries: China, France, Japan, US, Brazil
Risk Analysis
- Probability: High (widespread exposure of 4.2M hosts)
- Impact: Critical (network disruption, data interception)
- Attack complexity: Low (simple packet manipulation)
- Required privileges: None (external attack vector)
Action Items
- Implement IPSec or WireGuard for tunnel encryption
- Deploy Deep Packet Inspection (DPI) systems
- Configure traffic filtering on routers
- Block unencrypted tunneling packets
- Restrict tunnel acceptance to trusted sources
Sources
- [The Hacker News](https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html)