ExpressVPN has removed the split tunneling feature from the latest version of its software after finding that a bug exposed the domains users were visiting to configured DNS servers.
The bug was introduced in ExpressVPN Windows versions 12.23.1 - 12.72.0, published between May 19, 2022, and Feb. 7, 2024, and only affected those using the split tunneling feature.
The split tunneling feature allows users to selectively route some internet traffic in and out of the VPN tunnel, providing flexibility to those needing both local access and secure remote access simultaneously.
A bug in this feature caused DNS requests of users not to be directed to ExpressVPN's infrastructure, as they should, but to the user's internet service provider.
Usually, all DNS requests are done through ExpressVPN's logless DNS server to prevent ISPs and other organizations from tracking the domains a user visits.
This bug caused some DNS queries to be sent to the DNS server configured on the computer, usually a server at the user's ISP, allowing the server to track a user's browsing habits.
Having a DNS request leak like the one disclosed by ExpressVPN means that Windows users with active split tunneling potentially expose their browsing history to third parties, breaking a core promise of VPN products.
The issue was discovered and reported to the vendor by CNET's Attila Tomaschek and only occurs when the split tunneling mode is active.
Users of ExpressVPN versions 12.23.1 to 12.72.0 on Windows should upgrade their client to the latest version, 12.73.0.
The latest version removes the split tunneling feature.
ExpressVPN says they will re-introduce it in a future release when the bug is fixed.
If upgrading is impossible, disabling split tunneling should be enough to prevent the DNS request leaks, as the bug couldn't be replicated in any other mode.
If you absolutely need to use split tunneling, ExpressVPN recommends downloading and using version 10, which isn't impacted by the bug.
OpenAI rolls out imperfect fix for ChatGPT data leak flaw.
Fortra warns of new critical GoAnywhere MFT auth bypass, patch now.
Brave to end 'Strict' fingerprinting protection as it breaks websites.
AMD, Apple, Qualcomm GPUs leak AI data in LeftoverLocals attacks.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Sun, 11 Feb 2024 17:35:07 +0000