FINDING · DETECTION

The server-side variant of the blind VPN inference attack—where an in/on-path adversary exploits predictable NAT assignment and tunnel routing semantics to inject spoofed packets indistinguishable from legitimate encrypted traffic—has remained unacknowledged and unmitigated across all tested platforms since its concurrent disclosure in 2019. Unlike the client-side variant, which received partial fixes from Google (CVE-2019-9461, CVE-2024-49734) and Apple (iOS 17.2.1), no vendor has proposed a viable remediation or claimed ownership of the server-side attack surface.

From 2026-tolley-architecturalArchitectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures · §2.1, §3.1, §3.4 · 2026 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shaperst-injectionmiddlebox-interference

Extracted by claude-sonnet-4-6 — review before relying.