FINDING · DETECTION

When a VPN server uses Port Preservation for NAT, a co-tenant off-path attacker can infer another user's externally mapped source port by sending probe SYN packets with guessed ports through the tunnel and spoofed SYN/ACK verification packets outside the tunnel; confirmation comes from observing which port the VPN server forwards the response to, enabling targeted TCP session hijacking.

From 2026-yang-invisible-adversaries-systematicInvisible Adversaries: A Systematic Study of Session Manipulation Attacks on VPNs · §III-B1, §IV-A, Table II · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
rst-injection

Extracted by claude-sonnet-4-6 — review before relying.