FINDING · EVALUATION
A co-tenant attacker sharing the same VPN server can launch a port-exhaustion DoS in an average of 4 seconds with over 90% success rate, inject forged HTTP responses in 64.11 seconds at a 66.7% success rate, and hijack DNS responses at success rates of 20% to 70%.
From 2026-yang-invisible-adversaries-systematic — Invisible Adversaries: A Systematic Study of Session Manipulation Attacks on VPNs · §I, §IV-B, §IV-C, §IV-D · 2026 · arXiv preprint
Implications
- Shared-server circumvention architectures (multi-tenant VPN) are highly exposed: an adversary can operationally disable or intercept other users' traffic by simply subscribing to the same provider, without attacking the circumvention protocol itself.
- Per-user dedicated NAT or isolated IP allocation eliminates the shared connection-tracking table that makes these attacks possible.
Tags
Extracted by claude-sonnet-4-6 — review before relying.