The WireGuard client 0.5.3 on Windows insecurely configures the operating system and firewall such that traffic to a local network that uses non-RFC1918 IP addresses is blocked. This allows an adversary to trick the victim into blocking IP traffic to selected IP addresses and services even while the VPN is enabled. NOTE: the tunnelcrack.mathyvanhoef.com website uses this CVE ID to refer more generally to "LocalNet attack resulting in the blocking of traffic" rather than to only WireGuard.
References
Link | Resource |
---|---|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0015 | |
https://tunnelcrack.mathyvanhoef.com/details.html | Exploit Third Party Advisory |
https://wireguard.com | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
31 Oct 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2023, 16:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
CPE | cpe:2.3:a:wireguard:wireguard:0.5.3:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
CWE | CWE-610 | |
References | (MISC) https://wireguard.com - Product | |
References | (MISC) https://tunnelcrack.mathyvanhoef.com/details.html - Exploit, Third Party Advisory | |
First Time |
Microsoft
Wireguard Wireguard wireguard Microsoft windows |
09 Aug 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-09 23:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-35838
Mitre link : CVE-2023-35838
CVE.ORG link : CVE-2023-35838
JSON object : View
Products Affected
wireguard
- wireguard
microsoft
- windows
CWE
CWE-610
Externally Controlled Reference to a Resource in Another Sphere