PureVPN Vulnerability Exposes Users’ IPv6 Address While Toggling Wi-Fi CyberDudeBivash Threat Intelligence Report

Executive Summary

  • A vulnerability in PureVPN (Linux client, GUI v2.10.0 & CLI v2.0.1) leaks users’ IPv6 address when Wi-Fi reconnections occur or after system suspend/resume. Cyber Security News+1
  • IPv6 kill-switch protections fail to reapply properly; firewall rules are reset/erased and not restored after disconnect, leaving the system more exposed. Cyber Security News+2Anagogistis+2
  • Affects users on Ubuntu 24.04.3 LTS with kernel 6.8.0 and iptables-nft backend. Cyber Security News+1
  • Real risk for anyone using PureVPN for privacy: websites, emails, etc. may leak IPv6 traffic in periods when user expects full protection.

Affected Systems & Conditions

  • PureVPN Linux GUI v2.10.0 and CLI v2.0.1 clients. Cyber Security News+2BigGo+2
  • OS: Ubuntu Linux 24.04.3 LTS, kernel 6.8.0. The iptables/nft backend environment. Cyber Security News+1
  • Situations: toggling WiFi (disconnect/reconnect), system resume from suspend, or possibly after network state change.

What Exactly Leaks & What’s Broken

  1. IPv6 Leak Off-Tunnel
    • When WiFi toggled or resume, PureVPN fails to reinstate ip6tables rules in time. The system receives Router Advertisements (e.g. fe80::1) causing IPv6 route to reappear through the normal (ISP) interface. Cyber Security News+1
    • In CLI with IKS (IPv6 kill switch) enabled, VPN claims “connected” but IPv6 traffic is flowing off-tunnel. Anagogistis+1
    • In GUI mode, when the VPN disconnects, IPv4 is blocked but IPv6 remains until manual reconnection. Cyber Security News+1
  2. Firewall / iptables Reset / Wipe
    • On connection, PureVPN wipes existing iptables configuration: user rules, UFW chains, Docker rules, etc. Sets defaults to ACCEPT. Cyber Security News+1
    • On disconnect, firewall state is not restored; custom rules remain gone. System remains with permissive defaults. Anagogistis+1

Why This Is Dangerous

  • Privacy exposure: Users believe they’re protected but IPv6 IP leaks mean “real IP” visibility to sites / email servers / any service using IPv6.
  • Security exposure: Firewall wiping means local protections (block SSH, block incoming services etc) are gone; attackers could exploit open ports/services that were blocked earlier.
  • False trust indicator: UI shows “connected” but critical protections not active → misleading.

Detection & Hunting Playbook

Here are things to monitor if you’re detecting this or similar VPN client leaks.

  • Linux audit / syslog: monitor ip6tables rules; check policy on IPv6 OUTPUT / FORWARD / INPUT — does it flip to ACCEPT unexpectedly?
  • Network monitoring: traffic with IPv6 source addresses from VPN hosts when they should be off VN tunnel.
  • Client logs: events on network resume or WiFi reconnect; check if kill-switch or firewall rule reapplication fails.
  • Firewall state snapshots: before VPN, after connect, after disconnect / resume etc. Log differences.
  • Forge alerts for unexpected inbound connections after disconnect or during supposedly protected states.

Remediation & Mitigation

Immediate Steps

  • Disable or block IPv6 at OS level until PureVPN fixes this.
  • Manually maintain ip6tables rules; script backups/restoration.
  • After toggling WiFi or resume, check IPv6 route, or force reconnect.

Medium Term

  • Use VPN clients known for correct IPv6 kill-switch behavior.
  • Use external firewall tools (ufw, nftables) to enforce deny-by-default IPv6 OUTPUT / INPUT.
  • Monitor for changes in network interface state and automate tests.

Long Term & Ideal Fixes (for VPN vendors & users)

  • PureVPN to patch: ensure IPv6 kill-switch rules are reinstalled atomically during any network state change.
  • Never wipe user firewall rules without backing them up and restoring them properly.
  • GUI clients should show warning if IPv6 is detected off the tunnel.
  • Use OS support for “network connection hooks” (WiFi events, suspend resume) to enforce protection.

Recommendations & Roadmap

  • For privacy-conscious users: until fixed, consider using VPN providers with audited leak protection.
  • For enterprise: enforce device configuration policies where firewall rules for IPv6 are locked, test VPN connections thoroughly under varying network conditions.
  • Add IPv6 leak testing to your checklist: e.g. ipleak.net, custom test scripts.
  • Publish guides or advisories to help users mitigate until vendor fixes.

#CyberDudeBivash #PureVPN #IPv6Leak #VPNVulnerability #LinuxPrivacy #KillSwitchFail #NetworkSecurity #ThreatIntel

Leave a comment

Design a site like this with WordPress.com
Get started