Security News > 2023 > September > Atlas VPN zero-day vulnerability leaks users' real IP address
An Atlas VPN zero-day vulnerability affecting the Linux client leaks a user's real IP address simply by visiting a website.
Atlas VPN is a VPN product that offers a cost-effective solution based on WireGuard and supports all major operating systems.
A Reddit user named 'Educational-Map-8145' published a PoC exploit on Reddit that abuses the Atlas VPN Linux API to reveal a user's real IP addresses.
0.0.1:8076/connection/stop API endpoint URL. When this API endpoint is accessed, it automatically terminates any active Atlas VPN sessions that hide a user's IP address.
This is a severe privacy breach for any VPN user as it exposes their approximate physical location and actual IP address, allowing them to be tracked and nullifying one of the core reasons for using a VPN provider.
The vulnerability affects Atlas VPN Linux client version 1.0.3.
News URL
Related news
- Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks (source)
- Android bug can leak DNS traffic with VPN kill switch enabled (source)
- Android bug leaks DNS queries even when VPN kill switch is enabled (source)
- New attack leaks VPN traffic using rogue DHCP servers (source)
- Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability (source)
- New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation (source)
- Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability (source)