DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Private Internet Access notifies customers of IP Address Leak Vulnerability

Posted on November 30, 2015 by Dissent

If you use Private Internet Access, you should have a notification in your inbox. Here’s the text of the email they sent out today:

Dear Valued Customer,

On November 17, we were privately notified of an IP address leak vulnerability affecting the port forwarding feature of our service. Essentially, anyone connecting to a forwarded port on any of our VPN gateways could have their real IP address leaked to an attacker specifically targeting a PIA user.

Within 12 hours of the initial report, we developed and tested what we thought was a complete fix, and deployed it to all of our VPN gateways.

On November 26, the researchers who discovered the vulnerability made it public and we quickly noticed that our service was still vulnerable to the IP address leak in certain cases, despite our initial fix. After further investigation, we also realized there was a separate but related issue on our desktop client. To fix this issue we are releasing updated VPN apps to prevent any leaks. We released v.52 on November 27.

Protecting your privacy is our top priority and although exploiting this vulnerability is difficult and requires an attacker to specifically target you, we feel like we let you down with our initial response. Please accept our apologies, we are sorry.

We highly recommend users update to v.52 (or later) of the client. To ensure all of our beloved users remain protected, we have pushed an update to existing clients. Please update immediately from the application or visit one of the following links:

Windows: https://www.privateinternetaccess.com/installer/download_installer_win

Mac: https://www.privateinternetaccess.com/installer/download_installer_osx

Technical Facts:

The vulnerability relies on the fact that a direct route exists between the VPN client and server. If the client accesses a forwarded port on the VPN server that is maliciously set up by an attacker, the client will use the direct route using the user’s default route, bypassing the VPN entirely.

Our initial fix was to block VPN clients from accessing forwarded ports on the same server at the VPN gateway firewall level, but we soon discovered a flaw in our desktop clients that made the fix incomplete. When the client disconnected, the direct route to the VPN gateway was not removed, thereby making users vulnerable even after they disconnected from the VPN. Beginning with v.52, we remove these “lingering” direct routes to the VPN gateway at disconnect time.

Note: If you are connecting to our service with a native OpenVPN client, or PIA’s Android or iOS apps, you do not need a client-side fix.

Sincerely,
Private Internet Access Team
Subsidiary of London Trust Media Inc.

Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies
  • Four people bailed after arrests over cyber attacks on M&S, Co-op and Harrods
  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
Category: Business Sector

Post navigation

← In: Lucknow University student data hacked; uni admits loss but denies hack
Triple-S Management Corporation Settles HHS Charges by Agreeing to $3.5 Million HIPAA Settlement →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.