Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

4M+ Internet-Exposed Systems at Risk From Tunneling Protocol Vulnerabilities

Posted on July 17, 2025July 17, 2025 By CWS

Researchers have uncovered important safety vulnerabilities affecting thousands and thousands of laptop servers and routers worldwide, stemming from the insecure implementation of basic web tunneling protocols.

The issues might permit attackers to bypass safety controls, spoof their id, entry non-public networks, and launch highly effective denial-of-service assaults.

The invention was made by safety researchers Mathy Vanhoef and Angelos Beitis from the DistriNet-KU Leuven analysis group in Belgium.

Their investigation revealed that over 4.2 million web hosts, together with core web routers, VPN servers, and even residential routers, are improperly configured to just accept unauthenticated visitors over frequent tunneling protocols like IPIP, GRE, 4in6, and 6in4.

These protocols are important for contemporary community infrastructure, however don’t natively embrace authentication, a weak point that may be exploited if not correctly secured.

This widespread vulnerability is taken into account a broader manifestation of a beforehand recognized subject, CVE-2020-10136. The core drawback is that these susceptible techniques will be tricked into forwarding visitors from any supply, successfully turning them into one-way proxies that assist attackers cover their true location.

Vital Impression and New Assault Strategies

The implications of those vulnerabilities are extreme. Attackers can leverage them to spoof supply IP addresses, making it tough to hint malicious exercise. They could additionally acquire unauthorized entry into a company’s inside community or use the compromised system to launch assaults on different targets.

The analysis additionally delivered to gentle three new varieties of assaults that exploit these weaknesses:

Tunneled-Temporal Lensing (TuTL): A Denial-of-Service (DoS) assault that concentrates visitors in time, reaching a visitors amplification issue of at the least 16.

The Ping-Pong Assault: A stronger DoS assault the place packets are looped between two susceptible techniques, leading to an amplification issue of 75-fold or extra.

Financial Denial of Sustainability (EDoS): An assault that drains the outgoing bandwidth of a susceptible system, which might result in vital monetary prices for organizations utilizing third-party cloud companies.

A worldwide scan for susceptible hosts discovered vital exposures in China, the US, France, Japan, and Brazil. Main corporations, together with Softbank, China Cell, and others, have been discovered to have susceptible infrastructure.

In France, 1000’s of dwelling routers from a single web supplier have been affected. The researchers have notified all concerned events so the techniques will be secured.

A number of new CVE identifiers have been assigned to trace these vulnerabilities throughout totally different protocols:

CVE-2024-7595: Impacts GRE and GRE6 protocols.

CVE-2024-7596: Pertains to the expired Generic UDP Encapsulation (GUE) draft.

CVE-2025-23018: Covers IPv4-in-IPv6 and IPv6-in-IPv6 protocols.

CVE-2025-23019: Pertains to the IPv6-in-IPv4 protocol.

Consultants suggest that organizations evaluation their community configurations to forestall these assaults. The first protection is to configure techniques to solely settle for tunneled packets from trusted, whitelisted IP addresses.

For extra sturdy safety, community directors are urged to implement protocols like IPsec, which supplies the mandatory authentication and encryption which can be lacking by default.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:InternetExposed, Protocol, Risk, Systems, Tunneling, Vulnerabilities

Post navigation

Previous Post: Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data
Next Post: Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Related Posts

Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link Cyber Security News
Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News
Detecting and Remediating Misconfigurations in Cloud Environments Cyber Security News
Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
  • Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders
  • Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges
  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anne Arundel Dermatology Data Breach Impacts 1.9 Million People
  • Settlement Reached in Investors’ Lawsuit Against Meta CEO Mark Zuckerberg and Other Company Leaders
  • Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges
  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News