<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Vpn — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/vpn/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 20:57:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/vpn/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS Discovery API Calls from VPN ASN by New Identity</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</link><pubDate>Fri, 01 May 2026 20:57:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-vpn-discovery/</guid><description>This rule detects the initial use of AWS discovery APIs from VPN-associated ASNs by a previously unseen identity, indicating potential reconnaissance activity.</description><content:encoded><![CDATA[<p>This detection identifies the first-time occurrence of an IAM principal invoking discovery APIs from a source IP address associated with a known VPN autonomous system number (ASN). The rule focuses on high-signal discovery actions, such as credential checks, account enumeration, bucket inventory, compute inventory, and logging introspection within AWS CloudTrail logs. The goal is to detect potential reconnaissance activities originating from anonymizing networks, which may indicate malicious intent. The rule specifically omits broad <code>List*</code> and <code>Describe*</code> patterns to reduce false positives, focusing instead on a curated list of ASNs commonly associated with VPN providers and hosting services. It&rsquo;s important to validate ASN data using local intelligence and tailor the <code>event.action</code> list based on your environment&rsquo;s baseline. Hosting ASNs are dual-use and require careful monitoring.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to AWS credentials, possibly through compromised credentials or misconfigured IAM roles.</li>
<li>The attacker initiates a VPN connection to mask their origin and evade geographic restrictions or monitoring. The VPN endpoint&rsquo;s ASN belongs to a known VPN provider.</li>
<li>Using the compromised credentials and VPN connection, the attacker calls the AWS API to execute <code>GetCallerIdentity</code> to validate access.</li>
<li>The attacker enumerates IAM users and roles using <code>ListUsers</code> and <code>ListRoles</code> to map out the AWS environment&rsquo;s identity landscape.</li>
<li>The attacker inventories S3 buckets using <code>ListBuckets</code> to identify potential targets for data exfiltration or manipulation.</li>
<li>The attacker gathers information about EC2 instances, VPCs, and security groups using <code>DescribeInstances</code>, <code>DescribeVpcs</code>, and <code>DescribeSecurityGroups</code> to understand the network infrastructure.</li>
<li>The attacker lists available Lambda functions using <code>ListFunctions</code> to discover potential code execution opportunities.</li>
<li>The attacker collects logging configurations by calling <code>DescribeTrails</code> to identify logging gaps.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging these discovery techniques can lead to unauthorized access to sensitive data, privilege escalation, and lateral movement within the AWS environment. By mapping out the cloud infrastructure, attackers can identify vulnerabilities and misconfigurations to exploit. Compromised AWS environments can result in data breaches, service disruptions, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>AWS Discovery API Calls from VPN ASN by New Identity</code> to detect anomalous discovery activity originating from VPN ASNs.</li>
<li>Review the curated list of VPN-oriented ASNs within the rule query and update it with local intelligence from sources like RIPE, BGPView, or PeeringDB.</li>
<li>Enable AWS CloudTrail logs to capture the necessary event data for the Sigma rule to function effectively.</li>
<li>Tune the Sigma rule&rsquo;s <code>event.action</code> filter to include additional discovery-related API calls relevant to your environment, based on baseline analysis.</li>
<li>Investigate alerts generated by the Sigma rule by examining <code>aws.cloudtrail.user_identity.arn</code>, <code>event.action</code>, <code>event.provider</code>, <code>source.ip</code>, and <code>source.as.organization.name</code>.</li>
<li>Implement automated response actions, such as revoking sessions or rotating keys, when unexpected discovery activity is detected from VPN ASNs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>discovery</category><category>vpn</category></item><item><title>OpenVPN-auth-oauth2 Authentication Bypass in Plugin Mode</title><link>https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</link><pubDate>Wed, 22 Apr 2026 14:29:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openvpn-auth-bypass/</guid><description>A critical authentication bypass vulnerability exists in openvpn-auth-oauth2 versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode; clients that do not support WebAuth/SSO are incorrectly granted VPN access without completing OIDC authentication.</description><content:encoded><![CDATA[<p>OpenVPN-auth-oauth2, a plugin for OpenVPN, is susceptible to an authentication bypass vulnerability in versions 1.26.3 through 1.27.2 when deployed in the experimental plugin mode. This flaw allows unauthenticated VPN access for clients that do not support WebAuth/SSO. Specifically, standard OpenVPN clients like the Linux CLI <code>openvpn</code>, which do not advertise WebAuth/SSO support (<code>IV_SSO=webauth</code>), can bypass OIDC authentication and gain full network access. The default management-interface mode is not affected. Successful exploitation grants unauthorized access to the internal network behind the VPN. This vulnerability is addressed in version 1.27.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OpenVPN server running openvpn-auth-oauth2 in experimental plugin mode (versions 1.26.3 - 1.27.2).</li>
<li>Attacker uses a standard OpenVPN client (e.g., Linux <code>openvpn</code> CLI) that does not support WebAuth/SSO.</li>
<li>The client initiates a connection to the OpenVPN server, bypassing the expected WebAuth/SSO flow.</li>
<li>The openvpn-auth-oauth2 plugin attempts to deny the client by writing &ldquo;0&rdquo; to the <code>auth_control_file</code>.</li>
<li>The plugin incorrectly returns <code>OPENVPN_PLUGIN_FUNC_SUCCESS</code> to the OpenVPN server.</li>
<li>OpenVPN interprets the <code>FUNC_SUCCESS</code> return code as successful authentication, ignoring the &ldquo;0&rdquo; in the <code>auth_control_file</code>.</li>
<li>The OpenVPN server grants the unauthenticated client full access to the internal network behind the VPN.</li>
<li>Attacker gains unauthorized access to internal resources and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers full access to the internal network behind the OpenVPN server. This could lead to data breaches, lateral movement within the network, and potential compromise of sensitive systems. The vulnerability affects any deployment using the experimental plugin mode with vulnerable versions. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to openvpn-auth-oauth2 version 1.27.3 to apply the fix described in commit <a href="https://github.com/jkroepke/openvpn-auth-oauth2/commit/36f69a6c67c1054da7cbfa04ced3f0555127c8f2"><code>36f69a6</code></a>.</li>
<li>If immediate upgrade is not feasible, switch to the standalone management client mode (the default, non-plugin deployment) as a workaround.</li>
<li>Monitor OpenVPN server logs for connection attempts from clients that do not support WebAuth/SSO (identified by missing <code>IV_SSO=webauth</code> in the logs) and correlate with network access activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openvpn</category><category>authentication-bypass</category><category>vpn</category></item><item><title>Synology SSL VPN Client Plaintext Password Storage Vulnerability (CVE-2021-47961)</title><link>https://feed.craftedsignal.io/briefs/2026-04-synology-vpn-vuln/</link><pubDate>Fri, 10 Apr 2026 10:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-synology-vpn-vuln/</guid><description>Synology SSL VPN Client before 1.4.5-0684 stores passwords in plaintext, allowing remote attackers to potentially access or manipulate user PIN codes, leading to unauthorized VPN configuration and traffic interception.</description><content:encoded><![CDATA[<p>CVE-2021-47961 describes a vulnerability in Synology SSL VPN Client versions prior to 1.4.5-0684. The client software stores user passwords in plaintext, creating a security risk. An attacker with access to the system or the client&rsquo;s configuration files could potentially retrieve these passwords and use them to manipulate the VPN configuration. Successful exploitation of this vulnerability can lead to unauthorized access to the VPN, as well as the potential interception and monitoring of VPN traffic. This is particularly concerning for organizations relying on secure VPN connections for remote access and data transmission. This vulnerability was disclosed on April 10, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to the targeted system, either through physical access or remote access methods.</li>
<li>Attacker locates the Synology SSL VPN Client configuration file(s) on the compromised system.</li>
<li>Attacker opens the configuration file and retrieves the plaintext password stored within.</li>
<li>Attacker uses the retrieved password to access or modify the user&rsquo;s PIN code within the VPN client.</li>
<li>Attacker reconfigures the VPN client settings, potentially redirecting traffic through a malicious server.</li>
<li>User connects to the VPN using the modified configuration.</li>
<li>All VPN traffic from the user&rsquo;s machine is now routed through the attacker&rsquo;s server.</li>
<li>Attacker intercepts and monitors the user&rsquo;s VPN traffic, gaining access to sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47961 allows attackers to gain unauthorized access to sensitive data transmitted through the VPN connection. The number of victims is dependent on the number of deployments using the vulnerable Synology SSL VPN client version prior to 1.4.5-0684. Sectors utilizing Synology SSL VPN clients for remote access are particularly at risk. A successful attack can lead to data breaches, intellectual property theft, and potential compromise of internal systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Synology SSL VPN Client to version 1.4.5-0684 or later to patch CVE-2021-47961.</li>
<li>Deploy the Sigma rule &ldquo;Detect Synology VPN Client Configuration File Access&rdquo; to detect unauthorized access to configuration files.</li>
<li>Monitor network traffic for unusual VPN connection patterns indicative of traffic redirection, using existing network monitoring tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>plaintext-password</category><category>vpn</category><category>synology</category></item><item><title>Fortigate VPN CVE-2023-27997 Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</link><pubDate>Sat, 28 Feb 2026 00:46:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</guid><description>IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.</description><content:encoded>&lt;p>On February 28, 2026, network intrusion detection systems (IDS) flagged suspicious activity indicative of a potential exploit targeting Fortigate VPN servers. The activity involves a series of repeated GET requests directed towards the &lt;code>/remote/logincheck&lt;/code> endpoint, a known attack vector associated with CVE-2023-27997. This vulnerability allows unauthenticated attackers to execute arbitrary code via specially crafted requests. The observed traffic originates from the IPv6 address…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>initial-access</category></item><item><title>Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</link><pubDate>Thu, 26 Feb 2026 07:27:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</guid><description>Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.</description><content:encoded>&lt;p>On February 26, 2026, network intrusion detection systems (IDS) triggered alerts related to potential exploitation attempts targeting Fortigate VPN servers. The alerts highlight suspicious network activity originating from multiple IP addresses, specifically repeated GET requests to the &lt;code>/remote/logincheck&lt;/code> endpoint, a known vulnerability associated with CVE-2023-27997. This vulnerability could allow unauthorized access to the VPN. Additionally, an IPv4 address was observed using a suspicious…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>network</category></item></channel></rss>