7.6 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
7.5 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.2%
Security Advisory Description
By design, the DHCP protocol does not authenticate messages, including for example the classless static route option (121). An attacker with the ability to send DHCP messages can manipulate routes to redirect VPN traffic, allowing the attacker to read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. Many, if not most VPN systems based on IP routing are susceptible to such attacks. (CVE-2024-3661)
Impact
An attacker with the ability to send DHCP traffic in the client’s network may be able to trick the client into sending IP traffic outside the VPN tunnel.
This vulnerability affects only BIG-IP Edge Client (Windows, MacOS, Linux) and F5 Access (iOS/Windows); F5 Access (Android) is not affected.
Note: The procedure documented in APM-DHCP Access Policy Example and Detailed Instructions on DevCentral and K000135007: Configure dynamic DNS from a DHCP server for BIG-IP APM network access clients is not affected by this vulnerability.
7.6 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
7.5 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
17.2%