CVE-2026-24902

7.1 HIGH

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in TrustTunnel VPN software that allows attackers to bypass private network restrictions. When 'allow_private_network_connections = false' is configured, the software fails to validate numeric IP addresses, enabling connections to loopback and private network targets. Organizations using TrustTunnel versions before 0.9.114 are affected.

💻 Affected Systems

Products:
  • TrustTunnel
Versions: All versions prior to 0.9.114
Operating Systems: All platforms running TrustTunnel
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'allow_private_network_connections = false' is configured. The default configuration allows private network connections, making systems with this default setting not vulnerable.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot through the VPN server to access internal services, potentially reaching sensitive systems like databases, management interfaces, or internal APIs that should be isolated from external access.

🟠

Likely Case

Attackers could scan and access internal network services behind the VPN server, potentially exposing internal applications, file shares, or administrative interfaces that were intended to be protected.

🟢

If Mitigated

With proper network segmentation and additional firewall rules, the impact would be limited to the specific subnet where the VPN server resides, preventing lateral movement to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires VPN access, but once authenticated, the bypass is straightforward by providing numeric IP addresses instead of hostnames.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.114

Vendor Advisory: https://github.com/TrustTunnel/TrustTunnel/security/advisories/GHSA-hgr9-frvw-5r76

Restart Required: Yes

Instructions:

1. Stop TrustTunnel service. 2. Update to version 0.9.114 or later. 3. Restart TrustTunnel service. 4. Verify the fix by checking version and testing private network access restrictions.

🔧 Temporary Workarounds

Set allow_private_network_connections to true

all

Change configuration to allow private network connections, which removes the vulnerable code path entirely

Edit TrustTunnel configuration file and set: allow_private_network_connections = true

Network firewall restrictions

all

Implement network-level restrictions to block VPN server access to internal networks

Add firewall rules to restrict VPN server's outbound connections to internal IP ranges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the VPN server from sensitive internal networks
  • Deploy additional monitoring and alerting for VPN server connections to internal IP addresses

🔍 How to Verify

Check if Vulnerable:

Check TrustTunnel version and configuration. If version < 0.9.114 and allow_private_network_connections = false, the system is vulnerable.

Check Version:

trusttunnel --version or check package manager for installed version

Verify Fix Applied:

After patching, test that numeric IP addresses to private ranges (like 127.0.0.1, 192.168.1.1) are properly blocked when allow_private_network_connections = false.

📡 Detection & Monitoring

Log Indicators:

  • Connection attempts from VPN server to internal IP addresses
  • Failed connection attempts to private IP ranges when restrictions should be active

Network Indicators:

  • VPN server initiating connections to internal network IPs
  • Unusual traffic patterns from VPN server to loopback addresses

SIEM Query:

source_ip="VPN_SERVER_IP" AND dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 127.0.0.0/8)

🔗 References

📤 Share & Export