CVE-2024-25728
NixOS vulnerability analysis and mitigation

Overview

ExpressVPN versions 12.23.1 to 12.72.0 on Windows contained a security vulnerability (CVE-2024-25728) that affected the split tunneling feature. When split tunneling was enabled, DNS requests were incorrectly sent according to Windows configuration instead of being routed through ExpressVPN's secure DNS servers, potentially exposing users' browsing history to their Internet Service Providers (ISPs) (Bleeping Computer, ExpressVPN Blog).

Technical details

The vulnerability specifically manifested when using the "Only allow selected apps to use the VPN" split tunneling mode. Instead of routing DNS requests through ExpressVPN's logless DNS servers as intended, the requests were sent to the DNS server configured on the user's computer, typically operated by their ISP. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

The vulnerability potentially exposed the domains visited by affected users to their ISPs, compromising their browsing privacy. While the content of web traffic remained encrypted and unviewable by third parties, domain names (such as google.com) could be visible to ISPs. ExpressVPN estimates that less than 1% of their Windows users were impacted by this issue (ExpressVPN Blog).

Mitigation and workarounds

ExpressVPN has addressed the vulnerability by releasing version 12.73.0, which temporarily removes the split tunneling feature. Users are advised to upgrade to the latest version immediately. For those who cannot upgrade, disabling split tunneling prevents the DNS request leaks. The company plans to reintroduce split tunneling in a future release once the issue is fully resolved (ExpressVPN Blog).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management