The security community has discovered a dangerous exploit that allows computer criminals to exploit VPN connections and private browsers thereby accessing sensitive data.
VPN Software & Browsers Vulnerable to WebRTC Exploit
The security community has discovered a dangerous exploit that allows computer criminals to acquire private data through VPN connections and privacy browsers. This is done by targeting a vulnerability in the WebRTC technology which is used for delivering content. The issue is being tracked in a security advisory called CVE-2018-6849 which reads the following description:
In the WebRTC component in DuckDuckGo 4.2.0, after visiting a web site that attempts to gather complete client information (such as https://ip.voidsec.com), the browser can disclose a private IP address in a STUN request.
Once triggered the exploit causes the target software to “leak” data including the public and private IP address associated with the host. The technique is classified more as a privacy issue rather than security as the information can be used to directly identify the victims. WebRTC is being used in several popular web platforms that have responded to the issue as following:
- Google Chrome — The development team have stated that they are going to follow the security guidelines into fixing the issue. They offer a special “Network Limiter” extension that can enable a more restrict mode of operations.
- Facebook — The information leakage is not deemed sensitive enough to warrant an official bounty. The contents of the leaked data is not considered dangerous enough. If the issue persists with more serious content then the social network’s protective plans will come into effect.
- Android — The Android security team conducted a severity assessment. They rated it as a threat of low importance that does not meet the severity bars for inclusion into an Android security bulletin.
- Duck Duck Go — The security team is currently investigating the issue.
As the VPN software & web browsers can use the WebRTC vulnerability when planning their hacker attacks. In most cases the intended goal is to deliver various malware to the target users. As a result we recommend that all users employ a quality security software.
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter