PureVPN Vulnerability Exposes Users’ IPv6 Address While Toggling Wi-Fi CyberDudeBivash Threat Intelligence Report
Executive Summary
-
A vulnerability in PureVPN (Linux client, GUI v2.10.0 & CLI v2.0.1) leaks users’ IPv6 address when Wi-Fi reconnections occur or after system suspend/resume. Cyber Security News+1
-
IPv6 kill-switch protections fail to reapply properly; firewall rules are reset/erased and not restored after disconnect, leaving the system more exposed. Cyber Security News+2Anagogistis+2
-
Affects users on Ubuntu 24.04.3 LTS with kernel 6.8.0 and iptables-nft backend. Cyber Security News+1
-
Real risk for anyone using PureVPN for privacy: websites, emails, etc. may leak IPv6 traffic in periods when user expects full protection.
Affected Systems & Conditions
-
PureVPN Linux GUI v2.10.0 and CLI v2.0.1 clients. Cyber Security News+2BigGo+2
-
OS: Ubuntu Linux 24.04.3 LTS, kernel 6.8.0. The iptables/nft backend environment. Cyber Security News+1
-
Situations: toggling WiFi (disconnect/reconnect), system resume from suspend, or possibly after network state change.
What Exactly Leaks & What’s Broken
-
IPv6 Leak Off-Tunnel
-
When WiFi toggled or resume, PureVPN fails to reinstate ip6tables rules in time. The system receives Router Advertisements (e.g.
fe80::1
) causing IPv6 route to reappear through the normal (ISP) interface. Cyber Security News+1 -
In CLI with IKS (IPv6 kill switch) enabled, VPN claims “connected” but IPv6 traffic is flowing off-tunnel. Anagogistis+1
-
In GUI mode, when the VPN disconnects, IPv4 is blocked but IPv6 remains until manual reconnection. Cyber Security News+1
-
-
Firewall / iptables Reset / Wipe
-
On connection, PureVPN wipes existing iptables configuration: user rules, UFW chains, Docker rules, etc. Sets defaults to ACCEPT. Cyber Security News+1
-
On disconnect, firewall state is not restored; custom rules remain gone. System remains with permissive defaults. Anagogistis+1
-
Why This Is Dangerous
-
Privacy exposure: Users believe they're protected but IPv6 IP leaks mean “real IP” visibility to sites / email servers / any service using IPv6.
-
Security exposure: Firewall wiping means local protections (block SSH, block incoming services etc) are gone; attackers could exploit open ports/services that were blocked earlier.
-
False trust indicator: UI shows “connected” but critical protections not active → misleading.
Detection & Hunting Playbook
Here are things to monitor if you’re detecting this or similar VPN client leaks.
-
Linux audit / syslog: monitor
ip6tables
rules; check policy on IPv6 OUTPUT / FORWARD / INPUT — does it flip to ACCEPT unexpectedly? -
Network monitoring: traffic with IPv6 source addresses from VPN hosts when they should be off VN tunnel.
-
Client logs: events on network resume or WiFi reconnect; check if kill-switch or firewall rule reapplication fails.
-
Firewall state snapshots: before VPN, after connect, after disconnect / resume etc. Log differences.
-
Forge alerts for unexpected inbound connections after disconnect or during supposedly protected states.
Remediation & Mitigation
Immediate Steps
-
Disable or block IPv6 at OS level until PureVPN fixes this.
-
Manually maintain ip6tables rules; script backups/restoration.
-
After toggling WiFi or resume, check IPv6 route, or force reconnect.
Medium Term
-
Use VPN clients known for correct IPv6 kill-switch behavior.
-
Use external firewall tools (ufw, nftables) to enforce deny-by-default IPv6 OUTPUT / INPUT.
-
Monitor for changes in network interface state and automate tests.
Long Term & Ideal Fixes (for VPN vendors & users)
-
PureVPN to patch: ensure IPv6 kill-switch rules are reinstalled atomically during any network state change.
-
Never wipe user firewall rules without backing them up and restoring them properly.
-
GUI clients should show warning if IPv6 is detected off the tunnel.
-
Use OS support for “network connection hooks” (WiFi events, suspend resume) to enforce protection.
Recommendations & Roadmap
-
For privacy-conscious users: until fixed, consider using VPN providers with audited leak protection.
-
For enterprise: enforce device configuration policies where firewall rules for IPv6 are locked, test VPN connections thoroughly under varying network conditions.
-
Add IPv6 leak testing to your checklist: e.g.
ipleak.net
, custom test scripts. -
Publish guides or advisories to help users mitigate until vendor fixes.
#CyberDudeBivash #PureVPN #IPv6Leak #VPNVulnerability #LinuxPrivacy #KillSwitchFail #NetworkSecurity #ThreatIntel
Comments
Post a Comment