FINDING · EVALUATION
Empirical evaluation against nine major commercial VPN providers found all five tested connection tracking frameworks (Linux Netfilter, FreeBSD PF, IPFW, IPFilter, natd) and eight of nine providers vulnerable to at least one session manipulation attack, resulting in 19 assigned CVEs/CNVDs.
From 2026-yang-invisible-adversaries-systematic — Invisible Adversaries: A Systematic Study of Session Manipulation Attacks on VPNs · §I, §IV · 2026 · arXiv preprint
Implications
- VPN and proxy server operators using shared NAT must treat co-tenant users as potential adversaries, not just external censors; every tested major framework had at least one exploitable configuration.
- Circumvention infrastructure deployments should audit their OS-level connection tracking framework and port allocation strategy before assuming session isolation holds.
Tags
Extracted by claude-sonnet-4-6 — review before relying.