Unsecured Tunneling Protocols Compromise 4.2 Million Devices, Affecting VPNs and Routers
Recent studies reveal significant security vulnerabilities across various tunneling protocols, potentially allowing malicious actors to execute diverse attacks. Researchers from Top10VPN, collaborating with KU Leuven’s Mathy Vanhoef, indicate that Internet hosts accepting tunneling packets without sender verification can be exploited…