Impact
A flaw in TrustTunnel’s TLS listener causes the extraction of the client_random field to fail when the TLS ClientHello is split across multiple packets. The rule engine evaluates the client_random_prefix condition only when a value is available; when extraction fails, the rule is skipped and evaluation continues to the next rules. This behavior permits an attacker to bypass rules that rely solely on client_random_prefix to enforce security decisions, potentially allowing unauthorized traffic into the VPN, and represents a missing access control weakness.
Affected Systems
The vulnerability affects the TrustTunnel VPN client and server software, specifically all released versions older than 0.9.115. The affected component is the TLS listener and rule engine code that processes client random prefixes.
Risk and Exploitability
The CVSS score is 5.3, indicating medium severity. The EPSS score is less than 1%, suggesting low exploitation probability at the present time, and the vulnerability is not listed in the CISA KEV catalog. Attackers capable of sending a fragmented TLS handshake to a TrustTunnel listener can exploit the flaw over the network; no privileged access or additional conditions are required.
OpenCVE Enrichment