{"uuid": "7dfad627-b01e-4d81-a05c-6a3b2317cc2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3661", "type": "seen", "source": "https://t.me/KomunitiSiber/1918", "content": "New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation\nhttps://thehackernews.com/2024/05/new-tunnelvision-attack-allows.html\n\nResearchers have detailed a Virtual Private Network (VPN) bypass technique dubbed\u00a0TunnelVision\u00a0that allows threat actors to snoop on victim's network traffic by just being on the same local network.\nThe \"decloaking\"\u00a0method\u00a0has been assigned the CVE identifier\u00a0CVE-2024-3661\u00a0(CVSS score: 7.6). It impacts all operating systems that implement a DHCP client and has", "creation_timestamp": "2024-05-09T21:21:09.000000Z"}