Jump to content

Vulnerabilities in Multiple VPN Applications

Recommended Posts

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of vulnerabilities affecting multiple Virtual Private Network (VPN) applications. A remote attacker could exploit these vulnerabilities to take control of an affected system. CISA encourages administrators to review the following security advisories and apply the necessary updates:

Source: https://www.us-cert.gov/ncas/current-activity/2019/07/26/vulnerabilities-multiple-vpn-applications


Share this post

Link to post
Share on other sites

I have a question about using VPN (virtual Private Network) service. I didn't use too many VPN in the past. How does a free VPN work? I recently found an article from a blog 


 How much helpful it is? Thank you!

Edited by AdvancedSetup
Removed hyperlink

Share this post

Link to post
Share on other sites

The article has nothing to do with the use of a Virtual Private Network  ( VPN ).  Thus the article is non sequitur.

A VPN connection is where one uses software that tunnels all their outbound communication through the Internet and the traffic comes out from the POV of the VPN Provider's network.  Thus if you were connected to Bharti Airtel's network and you used a VPN with an exit node in Brazil, web sites you visit would see the IP address of the Brazilian network and not the IP address of Bharti Airtel's network.  The PC user's activity can't be seen by Bharti Airtel.  All they would see is that your PC would be connected to one IP address in Brazil as the traffic would be protected by a Transport Layer Security ( TLS )  encrypted connection.  A VPN really isn't needed if you are on a desktop on your home network unless you are super paranoid.  However if you are on a notebook and connect to WiFi HotSpots or connect to a Hotel's network, then a VPN would protect your Internet activity from hackers targeting WiFi HotSpots or deliberate spying on a Hotel network ( such as in the case during the Chinese Olympics at Chinese Hotels ).  If one travels often with a Laptop, alternatively one may obtain a Wireless WAN card or USB device as that basically is an appliance that combines a Cellular Phone connection with a MODEM such that its bypasses WiFi and Hotel type networks and makes a Laptop/Notebook work more like a Smart Phone in that in accesses a Cellular Network and locks out hackers to a greater degree.


It should be noted that if you are paranoid about your ISP and want to use a VPN, that paranoia extends to the VPN provider as the traffic you do NOT want to be seen by your ISP will be seen by the VPN Provider.  Thus you have to trust the VPN Provider much more than your ISP and as this threads subject post indicates, "...vulnerabilities affecting multiple Virtual Private Network (VPN)..." where a "...remote attacker could exploit these vulnerabilities ..."

Edited by David H. Lipman

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.