Cleartext transmission of sensitive information in Clario VPN for macOS - CVE-2023-36671

 

Cleartext transmission of sensitive information in Clario VPN for macOS - CVE-2023-36671

Published: October 31, 2023


Vulnerability identifier: #VU82574
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-36671
CWE-ID: CWE-319
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Clario VPN for macOS
Software vendor:
Clario Tech DMCC

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel even if this traffic is not generated by the VPN client. A remote attacker can trick the victim into sending plaintext traffic to the VPN server's IP address and thereby deanonymize the victim.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links