CVE-2024-3661

HIGH

DHCP - Info Disclosure

Title source: llm

Description

DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.

Exploits (3)

nomisec NO CODE
by YardenFadida · poc
https://github.com/YardenFadida/CVE-2024-3661_Demo
nomisec WORKING POC
by Roundthe-clock · poc
https://github.com/Roundthe-clock/CVE-2024-3661VPN
nomisec WORKING POC
by Wh1t3Fox · poc
https://github.com/Wh1t3Fox/CVE-2024-3661

References (20)

Scores

CVSS v3 7.6
EPSS 0.0242
EPSS Percentile 85.2%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-306 CWE-501
Status published
Products (12)
cisco/anyconnect_vpn_client
cisco/secure_client
citrix/secure_access_client < 24.06.1
f5/big-ip_access_policy_manager 7.2.3 - 7.2.5
fortinet/forticlient 7.4.0 (3 CPE variants)
fortinet/forticlient 6.4.0 - 7.2.5 (3 CPE variants)
paloaltonetworks/globalprotect (4 CPE variants)
watchguard/ipsec_mobile_vpn_client (2 CPE variants)
watchguard/mobile_vpn_with_ssl (2 CPE variants)
zscaler/client_connector
... and 2 more
Published May 06, 2024
Tracked Since Feb 18, 2026