PT-2024-3325 · Dhcp+3 · Dhcp+3

Dani Cronce

+1

·

Published

2024-05-06

·

Updated

2026-02-20

·

CVE-2024-3661

CVSS v3.1

7.6

High

VectorAV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Name of the Vulnerable Software and Affected Versions DHCP (affected versions not specified)
Description The issue is related to a lack of authentication in the DHCP protocol, specifically with the classless static route option (121). This allows an attacker to manipulate routes and potentially redirect VPN traffic, reading, disrupting, or modifying network traffic that was expected to be protected by the VPN. The vulnerability can be exploited by an attacker on the same local network, and it affects many VPN-based security solutions that rely on routes to redirect traffic.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability. However, as a temporary workaround, consider implementing network segmentation and monitoring for exploitation attempts. Additionally, using a VPN inside a virtual machine or connecting to the internet through a mobile device's Wi-Fi network may help minimize the risk of exploitation. Restricting access to the classless static route option (121) in the DHCP configuration may also help mitigate the issue until a patch is available.

Exploit

Missing Authentication

Information Disclosure

Weakness Enumeration

Related Identifiers

ALSA-2025:0288
ALSA-2025:0377
ALSA-2025_0288
ALSA-2025_0377
BDU:2024-03571
CVE-2024-3661
ELSA-2025-0288
ELSA-2025-0377
GHSA-HQMP-G7PH-X543
INFSA-2025_0288
INFSA-2025_0377
RHSA-2025:0288
RHSA-2025:0377
RHSA-2025:16411
RHSA-2025_0288
RHSA-2025_0377
RLSA-2025:0377
RLSA-2025_0288
RLSA-2025_0377

Affected Products

Almalinux
Dhcp
Red Hat
Rocky Linux