Wiz Agents & Workflows are here

CVE-2023-36673
Cisco AnyConnect Secure Client vulnerability analysis and mitigation

Overview

An issue was discovered in Avira Phantom VPN through 2.23.1 for macOS where the VPN client insecurely configures the operating system such that all IP traffic to the VPN server's IP address is sent in plaintext outside the VPN tunnel, even if this traffic is not generated by the VPN client, while simultaneously using plaintext DNS to look up the VPN server's IP address. This vulnerability, identified as CVE-2023-36673, allows an adversary to trick the victim into sending traffic to arbitrary IP addresses in plaintext outside the VPN tunnel (NVD).

Technical details

The vulnerability is part of a broader set of VPN vulnerabilities known as TunnelCrack. This specific issue, known as a ServerIP attack, involves DNS spoofing combined with routing table manipulation. The attack has a CVSS v3.1 base score of 7.3 (HIGH) with a vector string of CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N. The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information) (NVD, TunnelCrack).

Impact

The vulnerability allows attackers to read and intercept transmitted traffic, potentially exposing sensitive user information. Even if the victim is using another layer of encryption such as HTTPS, the attacks can reveal which websites a user is visiting, posing a significant privacy risk. The attack can be executed by untrusted Wi-Fi networks and malicious internet service providers (TunnelCrack, Help Net Security).

Mitigation and workarounds

For customers using Prisma Access, they are not impacted by ServerIP attacks. For PAN-OS with GlobalProtect Gateways configured with the address set as an IP rather than FQDN, they are also not impacted. Additionally, endpoints configured to use only an authenticated DNS mechanism such as DNS over TLS, DNS over HTTPS, or DNSSEC are protected from the ServerIP attacks (Palo Alto).

Community reactions

Several major VPN vendors have responded to the disclosure by releasing patches. Some example patched VPNs include Mozilla VPN, Surfshark, Malwarebytes, Windscribe, and Cloudflare's WARP. The vulnerability was discovered by Dr. Mathy Vanhoef and team, who coordinated with CERT/CC and various VPN vendors during a 90-day disclosure period (TunnelCrack).

Additional resources


SourceThis report was generated using AI

Related Cisco AnyConnect Secure Client vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20206HIGH7.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMar 05, 2025
CVE-2024-3661HIGH7.6
  • RustRust
  • gadmin-openvpn-server
NoYesMay 06, 2024
CVE-2024-20391MEDIUM6.8
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:secure_client
NoYesMay 15, 2024
CVE-2024-20474MEDIUM6.5
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesOct 23, 2024
CVE-2020-3432MEDIUM5.6
  • Cisco AnyConnect Secure ClientCisco AnyConnect Secure Client
  • cpe:2.3:a:cisco:anyconnect_secure_mobility_client
NoYesFeb 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management