CVE-2024-38520

5.3 MEDIUM

📋 TL;DR

This CVE describes an amplification/reflection vulnerability in SoftEtherVPN when L2TP is enabled. Attackers can spoof source IPs to send small packets to vulnerable servers, which respond with larger packets, enabling DDoS attacks against third parties. Affects all SoftEtherVPN deployments with L2TP enabled.

💻 Affected Systems

Products:
  • SoftEtherVPN
Versions: All versions before 5.02.5185
Operating Systems: All platforms supported by SoftEtherVPN
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when L2TP protocol is explicitly enabled in configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Vulnerable server becomes unwitting participant in large-scale DDoS attacks against other targets, potentially causing service disruption and attracting legal/abuse complaints.

🟠

Likely Case

Server bandwidth consumed by amplification traffic, degraded VPN performance, and potential involvement in DDoS campaigns.

🟢

If Mitigated

Minimal impact if L2TP disabled or patched; server continues normal VPN operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and uses standard network protocols; amplification attacks are well-known techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.02.5185

Vendor Advisory: https://github.com/SoftEtherVPN/SoftEtherVPN/security/advisories/GHSA-j35p-p8pj-vqxq

Restart Required: Yes

Instructions:

1. Download SoftEtherVPN version 5.02.5185 or later from official repository. 2. Stop SoftEtherVPN service. 3. Install/upgrade to patched version. 4. Restart SoftEtherVPN service.

🔧 Temporary Workarounds

Disable L2TP Protocol

all

Disable L2TP functionality in SoftEtherVPN configuration to eliminate vulnerability.

Edit SoftEtherVPN server config and set 'bool DisableL2TP true' or use management tool to disable L2TP

🧯 If You Can't Patch

  • Disable L2TP protocol in SoftEtherVPN configuration immediately
  • Implement network ACLs to block L2TP traffic (UDP ports 500, 1701, 4500) from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if SoftEtherVPN version is below 5.02.5185 AND L2TP is enabled in configuration.

Check Version:

vpncmd /server localhost /cmd About (Windows) or vpncmd localhost /server /cmd About (Linux)

Verify Fix Applied:

Verify SoftEtherVPN version is 5.02.5185 or higher using version check command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual L2TP connection attempts from spoofed IPs
  • High volume of L2TP traffic

Network Indicators:

  • Unexpected outbound traffic spikes on UDP ports 500/1701/4500
  • Asymmetric traffic patterns (small inbound, large outbound)

SIEM Query:

source_port IN (500, 1701, 4500) AND protocol=UDP AND bytes_out > 1000 AND bytes_in < 100

🔗 References

📤 Share & Export