Debug Code in ExpressVPN Windows App Caused IP Leak via RDP Port

Threat Score
68%
3 articles 100.0% Similarity 8 hours ago

Activity Timeline

ExpressVPN Windows Client Flaw Could Expose User I...
GB Hackers
Jul 22
04:55
ExpressVPN Windows Client Vulnerability Exposes Us...
Cybersecurity News
Jul 22
10:32
Debug Code in ExpressVPN Windows App Caused IP Lea...
The Cyber Express
Primary Article
Jul 22
12:16
  • A critical vulnerability in ExpressVPN's Windows app allows RDP traffic over port 3389 to bypass the VPN tunnel, exposing users' real IP addresses.
  • The flaw was identified through a bug bounty program and is linked to debug code inadvertently included in production builds of Version 12 of the Windows client.
  • Affected versions include the ExpressVPN Windows client prior to the patch, specifically Version 12.101.0.45, which has been released to address this issue.
  • The vulnerability does not compromise encryption but could reveal user connection details to on-network observers or ISPs, posing a risk in enterprise environments.
  • Users are urged to immediately update to the latest version to mitigate exposure risks associated with RDP connections.

ExpressVPN has disclosed a critical vulnerability in its Windows application that allows Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users' real IP addresses. This issue, discovered through a bug bounty program, affects specific versions of the Windows client prior to the release of Version 12.101.0.45. While encryption remains intact, the flaw poses significant risks in enterprise settings where RDP is commonly used. Users must update to the latest version immediately to protect against potential IP exposure and ensure secure remote connections.

Save to Folder

Choose a folder to save this cluster: