DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Private Internet Access notifies customers of IP Address Leak Vulnerability

Posted on November 30, 2015 by Dissent

If you use Private Internet Access, you should have a notification in your inbox. Here’s the text of the email they sent out today:

Dear Valued Customer,

On November 17, we were privately notified of an IP address leak vulnerability affecting the port forwarding feature of our service. Essentially, anyone connecting to a forwarded port on any of our VPN gateways could have their real IP address leaked to an attacker specifically targeting a PIA user.

Within 12 hours of the initial report, we developed and tested what we thought was a complete fix, and deployed it to all of our VPN gateways.

On November 26, the researchers who discovered the vulnerability made it public and we quickly noticed that our service was still vulnerable to the IP address leak in certain cases, despite our initial fix. After further investigation, we also realized there was a separate but related issue on our desktop client. To fix this issue we are releasing updated VPN apps to prevent any leaks. We released v.52 on November 27.

Protecting your privacy is our top priority and although exploiting this vulnerability is difficult and requires an attacker to specifically target you, we feel like we let you down with our initial response. Please accept our apologies, we are sorry.

We highly recommend users update to v.52 (or later) of the client. To ensure all of our beloved users remain protected, we have pushed an update to existing clients. Please update immediately from the application or visit one of the following links:

Windows: https://www.privateinternetaccess.com/installer/download_installer_win

Mac: https://www.privateinternetaccess.com/installer/download_installer_osx

Technical Facts:

The vulnerability relies on the fact that a direct route exists between the VPN client and server. If the client accesses a forwarded port on the VPN server that is maliciously set up by an attacker, the client will use the direct route using the user’s default route, bypassing the VPN entirely.

Our initial fix was to block VPN clients from accessing forwarded ports on the same server at the VPN gateway firewall level, but we soon discovered a flaw in our desktop clients that made the fix incomplete. When the client disconnected, the direct route to the VPN gateway was not removed, thereby making users vulnerable even after they disconnected from the VPN. Beginning with v.52, we remove these “lingering” direct routes to the VPN gateway at disconnect time.

Note: If you are connecting to our service with a native OpenVPN client, or PIA’s Android or iOS apps, you do not need a client-side fix.

Sincerely,
Private Internet Access Team
Subsidiary of London Trust Media Inc.
Category: Business Sector

Post navigation

← In: Lucknow University student data hacked; uni admits loss but denies hack
Triple-S Management Corporation Settles HHS Charges by Agreeing to $3.5 Million HIPAA Settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.