CVE-2025-24356

7.5 HIGH

📋 TL;DR

CVE-2025-24356 is a UDP amplification vulnerability in fastd VPN daemon that allows attackers to spoof source addresses and trigger handshake packets, creating a 12-13x traffic amplification effect. This can be used to facilitate Distributed Denial of Service attacks against third parties. All internet-facing fastd instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • fastd VPN daemon
Versions: All versions before v23
Operating Systems: All operating systems running fastd
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances that are reachable via UDP from untrusted networks. The vulnerability exists in the fast reconnect feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use vulnerable fastd instances as amplifiers in large-scale DDoS attacks, generating significant traffic volumes that could overwhelm target networks and services.

🟠

Likely Case

Internet-exposed fastd instances could be abused as DDoS amplifiers, potentially causing service disruption for targeted victims and consuming bandwidth/resources on the fastd host.

🟢

If Mitigated

With proper network controls and patching, the risk is limited to internal network reconnaissance or minimal impact if only internal-facing instances exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only sending crafted UDP packets to vulnerable instances. No authentication or special conditions needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v23

Vendor Advisory: https://github.com/neocturne/fastd/commit/1f233bee76b722c0b3f9024f2c39c72e9f7e5843

Restart Required: Yes

Instructions:

1. Stop fastd service. 2. Update to fastd v23 or later using your package manager or compile from source. 3. Restart fastd service.

🔧 Temporary Workarounds

Network Access Control

all

Restrict UDP access to fastd ports (default 10000/udp) to trusted networks only using firewall rules.

iptables -A INPUT -p udp --dport 10000 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p udp --dport 10000 -j DROP

🧯 If You Can't Patch

  • Implement strict firewall rules to only allow UDP access from trusted peer IP addresses
  • Consider moving fastd instances behind VPN or private networks to prevent internet exposure

🔍 How to Verify

Check if Vulnerable:

Check fastd version with 'fastd --version' and verify it's below v23

Check Version:

fastd --version

Verify Fix Applied:

Confirm version is v23 or higher with 'fastd --version' and test that fast reconnect still works for legitimate peers

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of handshake packets
  • Connection attempts from unknown IP addresses
  • High UDP traffic to/from fastd port

Network Indicators:

  • UDP traffic amplification patterns
  • Spoofed source IPs in UDP packets to fastd port
  • Unusual outbound traffic from fastd instances

SIEM Query:

source_port:10000 AND protocol:UDP AND (bytes_out > bytes_in * 10)

🔗 References

📤 Share & Export