CVE-2026-24904
Rule Bypass Vulnerability in TrustTunnel VPN Before
Publication date: 2026-01-29
Last updated on: 2026-02-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| adguard | trusttunnel | to 0.9.115 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in TrustTunnel, an open-source VPN protocol, occurs in versions prior to 0.9.115 due to a rule bypass issue. When the function that extracts the client random value from TLS traffic fails (for example, if the ClientHello message is fragmented across TCP writes), the extraction returns None. Because the rules engine only evaluates rules based on the client_random_prefix when the client_random is present, any rules relying on this prefix are skipped if extraction fails. This causes the evaluation to fall through to later rules, potentially bypassing intended restrictions. The issue is fixed in version 0.9.115.
How can this vulnerability impact me? :
This vulnerability can allow certain VPN traffic to bypass rules that rely on the client_random_prefix for matching. As a result, intended restrictions or controls based on these rules may be bypassed, potentially allowing unauthorized or unintended traffic through the VPN. This could reduce the effectiveness of security policies enforced by TrustTunnel.
What immediate steps should I take to mitigate this vulnerability?
Upgrade TrustTunnel to version 0.9.115 or later, as this version contains the fix for the rule bypass issue described.