More people are using VPNs and Wi-Fi routers than ever before. However, combining these two may not be a great idea unless you use the best protocol, according to the latest research. A study from Top10VPN has reported that a total of 4.2 million hosts, including VPNs and routers, are susceptible to hijacking attempts when using unsecured tunneling protocols.

    Though VPN servers and routers are at the top of the list, they also include other devices like core internet routers, ISP routers, and CDN nodes. Considering the increasing popularity of VPNs, especially at router levels, this vulnerability can make millions of users susceptible to attacks. Although most of these devices are found in China, Brazil, and the United States, devices in other areas are just as likely to be susceptible.

    4.2 Million VPNs and Routers Affected by Unsecured Tunneling Protocols

    The attack is expected to utilize some vulnerabilities with unsecured tunneling protocols, which allow threat actors to spoof the IP address of devices on the network. As a result, attackers can gain access to devices on the individual or organization-level networks. The study reports that many old-generation protocols, namely IPIP/IP6IP6, GRE/GRE6, 4in6, and 6in4, are the most affected by these networks.

    So, users still relying on these protocols will have to shift to another connection protocol, especially if the same is used for organization-level access. More importantly, because the vulnerability can provide threat actors with unauthorized access to the virtual private network, it can cause many Denial-of-Service attacks as well.

    It is worth noting that the affected tunneling protocols are not exactly popular among the consumer user base. On the other hand, thousands of companies, including Softbank and China Mobile, have many hosts that are found to be susceptible to these attacks. The research has identified vulnerable hosts in almost all parts of the world.

    4.2 Million VPNs and Routers Affected by Unsecured Tunneling Protocols

    Nevertheless, ascertaining the exact number could be difficult, especially considering the nature of the protocols and their user base. However, the research team from Top10VPN has suggested a few methods to prevent such attacks while patches are rolled out. Some of them include setting up additional methods for authentication and shifting to another tunneling protocol. At a network level, other methods like Deep Packet Inspection (DPI) and completely blocking unencrypted traffic may also help. Most of these protocols are not equipped with the necessary encryption tech, or the threat actor community has found methods to overcome these security measures. For consumers, it is yet another reminder to keep using only the most trusted VPN protocols.

    Share.

    Pavan Lipare is a tech enthusiast with a profound understanding of routers, WiFi networks, LAN setups, and internet connectivity. His fervent passion for technology extends to digital marketing, where he combines his technical expertise with strategic insights. Pavan is dedicated to sharing his knowledge and empowering others in navigating the ever-evolving landscape of digital connectivity and communication technologies.

    Leave A Reply