IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.
Link | Tags |
---|---|
https://datatracker.ietf.org/doc/html/rfc2473 | technical description |
https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf | technical description |
https://www.top10vpn.com/research/tunneling-protocol-vulnerability/ | technical description |