Vulnerability Description
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ietf | Ipv6 | - |
Related Weaknesses (CWE)
References
- https://datatracker.ietf.org/doc/html/rfc2473Technical Description
- https://papers.mathyvanhoef.com/usenix2025-tunnels.pdfTechnical Description
- https://www.top10vpn.com/research/tunneling-protocol-vulnerability/Technical Description
- https://www.kb.cert.org/vuls/id/199397
FAQ
What is CVE-2025-23018?
CVE-2025-23018 is a vulnerability with a CVSS score of 5.4 (MEDIUM). IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exp...
How severe is CVE-2025-23018?
CVE-2025-23018 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-23018?
Check the references section above for vendor advisories and patch information. Affected products include: Ietf Ipv6.