Amplification Vulnerability in fastd VPN Daemon
CVE-2025-24356
6.9MEDIUM
What is CVE-2025-24356?
fastd, a VPN daemon known for tunneling IP packets, has a vulnerability that allows attackers to exploit the fast reconnect feature. By sending UDP packets with spoofed source addresses, an attacker can induce the fastd instance to initiate a handshake with an amplification factor of approximately 12-13 times. This behavior can facilitate Distributed Denial of Service (DDoS) attacks against targeted networks, making it essential for users to update to version 23 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
fastd < 23
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
