Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

4 Million Systems Exposed to Tunneling Flaws

January 17, 2025
Reading Time: 2 mins read
in Alerts
4 Million Systems Exposed to Tunneling Flaws

New research by Mathy Vanhoef, a professor at KU Leuven University in Belgium, and PhD student Angelos Beitis, reveals that over 4 million systems worldwide, including VPN servers and home routers, are vulnerable to attacks due to tunneling protocol flaws. These vulnerabilities are primarily caused by misconfigured systems that accept tunneling packets without verifying the sender’s identity. The researchers found that various tunneling protocols, such as IPIP/IP6IP6, GRE/GRE6, 4in6, and 6in4, are vulnerable to exploitation, allowing attackers to exploit the flaws and launch a range of malicious attacks.

Tunneling protocols are essential for transporting data across different networks

Tunneling protocols are essential for transporting data across different networks, often used to run protocols like IPv6 over IPv4. However, they are susceptible to abuse if misconfigured. The research shows that when systems fail to authenticate packets properly, attackers can send specially crafted packets that contain a victim’s IP address. These packets are then forwarded to the victim by the vulnerable host, providing attackers with a method to launch attacks such as anonymous DoS attacks, DNS spoofing, and even gain access to internal networks and IoT devices.

The researchers conducted an internet-wide scan, identifying over 4.26 million vulnerable hosts, which include VPN servers, home routers provided by ISPs, core internet routers, mobile network gateways, and CDN nodes. Over 1.8 million of these vulnerable hosts are spoofing-capable, meaning attackers can conduct anonymous attacks by using any IP address as the source address for the inner packet. This allows attackers to remain undetected, making it significantly harder for network defenders to identify and mitigate the threat.

The study reveals that a majority of these vulnerable systems are located in China, followed by France. CVE identifiers CVE-2024-7595, CVE-2025-23018, CVE-2025-23019, and CVE-2024-7596 have been assigned to these vulnerabilities. The researchers have shared technical details of their findings and offered recommendations for mitigating the risks. They suggest that individual hosts, ISPs, and other network owners can implement defense measures to secure vulnerable systems and prevent attackers from leveraging these flaws for malicious purposes.

Reference:
  • Over 4 Million Systems Exposed to Tunneling Protocol Vulnerabilities
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Minecraft Mods On GitHub Spread Malware

June 19, 2025
Russian Phishing Scam Bypasses Google 2FA

Russian Phishing Scam Bypasses Google 2FA

June 19, 2025
Fake Invoices Deliver Sorillus RAT In Europe

Fake Invoices Deliver Sorillus RAT In Europe

June 19, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial