Jump to content

Recommended Posts

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of vulnerabilities affecting multiple Virtual Private Network (VPN) applications. A remote attacker could exploit these vulnerabilities to take control of an affected system. CISA encourages administrators to review the following security advisories and apply the necessary updates:

Source: https://www.us-cert.gov/ncas/current-activity/2019/07/26/vulnerabilities-multiple-vpn-applications

 

Link to post
Share on other sites

  • 3 months later...

The article has nothing to do with the use of a Virtual Private Network  ( VPN ).  Thus the article is non sequitur.

A VPN connection is where one uses software that tunnels all their outbound communication through the Internet and the traffic comes out from the POV of the VPN Provider's network.  Thus if you were connected to Bharti Airtel's network and you used a VPN with an exit node in Brazil, web sites you visit would see the IP address of the Brazilian network and not the IP address of Bharti Airtel's network.  The PC user's activity can't be seen by Bharti Airtel.  All they would see is that your PC would be connected to one IP address in Brazil as the traffic would be protected by a Transport Layer Security ( TLS )  encrypted connection.  A VPN really isn't needed if you are on a desktop on your home network unless you are super paranoid.  However if you are on a notebook and connect to WiFi HotSpots or connect to a Hotel's network, then a VPN would protect your Internet activity from hackers targeting WiFi HotSpots or deliberate spying on a Hotel network ( such as in the case during the Chinese Olympics at Chinese Hotels ).  If one travels often with a Laptop, alternatively one may obtain a Wireless WAN card or USB device as that basically is an appliance that combines a Cellular Phone connection with a MODEM such that its bypasses WiFi and Hotel type networks and makes a Laptop/Notebook work more like a Smart Phone in that in accesses a Cellular Network and locks out hackers to a greater degree.

EDIT:

It should be noted that if you are paranoid about your ISP and want to use a VPN, that paranoia extends to the VPN provider as the traffic you do NOT want to be seen by your ISP will be seen by the VPN Provider.  Thus you have to trust the VPN Provider much more than your ISP and as this threads subject post indicates, "...vulnerabilities affecting multiple Virtual Private Network (VPN)..." where a "...remote attacker could exploit these vulnerabilities ..."

Edited by David H. Lipman
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.