ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection
- С сайта: Vulnerability(cybersecuritynews.com)
- Вернуться к списку новостей
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection
Author: KaaviyaA critical security vulnerability in ExpressVPN Windows desktop application that could expose users’ real IP addresses when using Remote Desktop Protocol (RDP) connections.
The flaw, discovered through the company’s bug bounty program, affected specific versions of the Windows client and allowed TCP traffic over port 3389 to bypass the VPN tunnel, potentially revealing users’ actual network locations to internet service providers and network observers.
Key Takeaways
1. ExpressVPN’s Windows app leaked real IPs via RDP traffic.
2. The issue, affecting primarily enterprise RDP users.
3. ExpressVPN patched with version 12.101.0.45.
ExpressVPN RDP Leak Vulnerability
The vulnerability stemmed from debug code that was inadvertently included in production builds of ExpressVPN’s Windows application, specifically affecting versions 12.97 through 12.101.0.2-beta.
This code caused a critical routing failure where traffic usingTCP port3389, the standard port for Remote Desktop Protocol connections, would not be properly tunneled through the VPN infrastructure as intended.
When users established RDP connections while connected to ExpressVPN, their actual IP addresses became visible to network observers, including ISPs and potential attackers on the same network.
While the vulnerability did not compromise the encryption of RDP sessions themselves, it created a significant privacy breach by allowing third parties to identify both the user’s connection to ExpressVPN and their access to specific remote servers.
This type of exposure defeats the primary purpose of VPN protection, which is to mask users’ real network locations and maintain anonymity.
Security researcher Adam-X responsibly disclosed the vulnerability to ExpressVPN through their bug bounty platform.
ExpressVPN deployed a comprehensive fix just five days later in version 12.101.0.45, which was subsequently rolled out across all distribution channels.
The timeline showcases ExpressVPN’s dedication to transparency and swift remediation when security issues are identified through their responsible disclosure program
Mitigations
To prevent similar issues in the future, ExpressVPN has implemented enhanced internal safeguards with more rigorous automated testing protocols designed to identify and remove debug code before it reaches production environments.
These improvements include targeted checks specifically designed to catch development artifacts and reduce the likelihood of human error during the software release process.
Users are strongly advised to update to the latest version of the ExpressVPN Windows application to ensure they benefit from these security enhancements and maintain optimal privacy protection during their VPN sessions.
#Cyber_Security #Cyber_Security_News #Vulnerability #Windows #cyber_security #cyber_security_news #vulnerability
Оригинальная версия на сайте: