1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
Dismiss Notice

Welcome To SNBForums

SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.

If you'd like to post a question, simply register and have at it!

While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!

CVE-2019-14899 VPN Injection

Discussion in 'Asuswrt-Merlin' started by tului, Dec 5, 2019.

  1. tului

    tului Occasional Visitor

    Joined:
    Oct 16, 2012
    Messages:
    36
    Any word from Asus about this?

    "
    Security researchers found a new vulnerability allowing potential attackers to hijack VPN connections on affected *NIX devices and inject arbitrary data payloads into IPv4 and IPv6 TCP streams.

    They disclosed the security flaw tracked as CVE-2019-14899 to distros and the Linux kernel security team, as well as to others impacted such as Systemd, Google, Apple, OpenVPN, and WireGuard."
     
  2. coxhaus

    coxhaus Part of the Furniture

    Joined:
    Oct 7, 2010
    Messages:
    3,237
    Location:
    texas
    Here we go, another round of patches across the board for all brands.
     
  3. ColinTaylor

    ColinTaylor Part of the Furniture

    Joined:
    Mar 31, 2014
    Messages:
    10,255
    Location:
    UK
  4. ColinTaylor

    ColinTaylor Part of the Furniture

    Joined:
    Mar 31, 2014
    Messages:
    10,255
    Location:
    UK
    Reading the explanation here this doesn't seem particularly applicable to home routers. They are talking about a VPN client running on a PC, and that PC has connected to an access point that's already totally owned by the bad guys.
     
    Last edited: Dec 5, 2019
    tului likes this.
  5. RMerlin

    RMerlin Super Moderator

    Joined:
    Apr 14, 2012
    Messages:
    31,824
    Location:
    Canada
    This indeed indicate it requires the AP to already be under the control of the attacker, therefore I don't see it as a risk in this case. The typical attack is more along the lines of when you are connecting to an AP that you do not control, then the owner of that AP may be able to extract some information relative to your VPN connection (but not the actual content).

    In short: nothing to worry about here.
     
    martinr, tului and SMS786 like this.
  6. tului

    tului Occasional Visitor

    Joined:
    Oct 16, 2012
    Messages:
    36
    I guess more to fear from a NordVPN tier compromise
     
  7. RMerlin

    RMerlin Super Moderator

    Joined:
    Apr 14, 2012
    Messages:
    31,824
    Location:
    Canada
    The most likely scenario would be if you were connecting to a public hotspot, and a malicious entity had control over that public hostpot, and used it to deduce some of that info.
     
  8. netware5

    netware5 Senior Member

    Joined:
    Mar 9, 2013
    Messages:
    412
    Location:
    Bulgaria
    I have a feeling that this vulnerability does not affect the TAP tunnels ....
     
  9. SO333

    SO333 Occasional Visitor

    Joined:
    Jul 15, 2014
    Messages:
    17
    They write: " This allows us to inject data into the TCP stream and hijack connections"
    Does anyone know whether this "data" would be processed in terms of correct decryption and processing by the victim, or is this just garbage that cannot be decrypted and is discarded right away?