CVE-2023-48957
📋 TL;DR
The PureVPN Linux client 2.0.2-Productions fails to properly route DNS queries through the VPN tunnel, allowing DNS requests to leak to ISP or default DNS servers. This affects Linux users running the vulnerable PureVPN client version, potentially exposing their DNS queries and revealing browsing activity despite using a VPN.
💻 Affected Systems
- PureVPN Linux Client
📦 What is this software?
Purevpn by Purevpn
⚠️ Risk & Real-World Impact
Worst Case
Complete DNS query leakage revealing all domains visited by the user, enabling ISP surveillance, targeted attacks based on browsing patterns, and potential deanonymization despite VPN usage.
Likely Case
Intermittent DNS leaks revealing some browsing activity to ISP or network operators, compromising privacy expectations of VPN users.
If Mitigated
Minimal impact if alternative DNS protection mechanisms are in place or if VPN is used only for non-sensitive activities.
🎯 Exploit Status
Exploitation requires local access to the affected system; DNS leak testing tools can easily detect this vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available; refer to workarounds section for mitigation steps.
🔧 Temporary Workarounds
Manual DNS Configuration
linuxConfigure system to use secure DNS servers directly instead of relying on PureVPN's DNS handling
sudo nano /etc/resolv.conf
Add nameserver 1.1.1.1 or 8.8.8.8
sudo chattr +i /etc/resolv.conf
Use Alternative VPN Client
linuxSwitch to a different VPN client or use OpenVPN/WireGuard directly with PureVPN servers
sudo apt install openvpn
Download PureVPN OpenVPN configs from their website
🧯 If You Can't Patch
- Discontinue use of PureVPN Linux client until patch is available
- Use browser-based VPN extensions or alternative privacy tools for sensitive browsing
🔍 How to Verify
Check if Vulnerable:
Run DNS leak test while connected to PureVPN: use dnsleaktest.com or 'nslookup example.com' and check if queries go to ISP DNS
Check Version:
purevpn --version or check installed package version
Verify Fix Applied:
After applying workarounds, run DNS leak tests again to confirm all queries route through VPN tunnel
📡 Detection & Monitoring
Log Indicators:
- DNS queries to non-VPN DNS servers
- Unexpected DNS server responses in network logs
Network Indicators:
- DNS traffic bypassing VPN tunnel interface
- Queries to ISP DNS servers while VPN is active
SIEM Query:
source="network" dest_port=53 NOT dest_ip IN (vpn_dns_servers)