Lucene search

K
cve[email protected]CVE-2023-35838
HistoryAug 09, 2023 - 11:15 p.m.

CVE-2023-35838

2023-08-0923:15:10
CWE-610
web.nvd.nist.gov
40
23
cve-2023-35838
wireguard
windows
vpn
security
firewall
ip addresses

5.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to “LocalNet attack resulting in the blocking of traffic” rather than to only WireGuard.

Affected configurations

NVD
Node
wireguardwireguardMatch0.5.3
AND
microsoftwindowsMatch-
CPENameOperatorVersion
wireguard:wireguardwireguardeq0.5.3

Social References

More

5.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

5.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Related for CVE-2023-35838