Cyber Posture

CVE-2026-24902

HighPublic PoC

Published: 29 January 2026

Published
29 January 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
EPSS Score 0.0004 12.0th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24902 is a high-severity SSRF (CWE-918) vulnerability in Adguard Trusttunnel. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-918

Penetration testing attempts server-side requests to internal resources, identifying SSRF weaknesses for remediation.

addresses: CWE-918

Outbound connections to external resources can be monitored and limited at the boundary, reducing SSRF impact.

addresses: CWE-918

Validates server-side URLs and resource references to block SSRF attempts.

addresses: CWE-918

Detects server-side request forgery through monitoring of unexpected outbound connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

SSRF bypass in public-facing VPN tcp_forwarder directly enables T1190 (exploiting the exposed service for unauthorized internal access) and T1046 (abusing the connect primitive to probe/discover private/loopback services).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0.9.114. In `tcp_forwarder.rs`, SSRF protection for `allow_private_network_connections = false` was only applied in the `TcpDestination::HostName(peer)` path. The `TcpDestination::Address(peer) =>…

more

peer` path proceeded to `TcpStream::connect()` without equivalent checks (for example `is_global_ip`, `is_loopback`), allowing loopback/private targets to be reached by supplying a numeric IP. The vulnerability is fixed in version 0.9.114.

Deeper analysisAI

CVE-2026-24902 is a server-side request forgery (SSRF) and private network restriction bypass vulnerability (CWE-918) in the open-source TrustTunnel VPN protocol, affecting versions prior to 0.9.114. The flaw exists in the `tcp_forwarder.rs` component, where SSRF protections for `allow_private_network_connections = false` were only applied to the `TcpDestination::HostName(peer)` path. The `TcpDestination::Address(peer)` path directly invoked `TcpStream::connect()` without equivalent checks like `is_global_ip` or `is_loopback`, enabling connections to loopback or private IP targets when supplied as numeric IPs.

The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N), indicating exploitation over the network with low complexity, requiring low privileges but no user interaction. A low-privileged remote attacker can bypass private network restrictions to connect to otherwise protected loopback or private destinations, resulting in low confidentiality impact, high integrity impact through unauthorized access, and no availability impact.

TrustTunnel fixed the issue in version 0.9.114. Mitigation details are available in the GitHub security advisory at https://github.com/TrustTunnel/TrustTunnel/security/advisories/GHSA-hgr9-frvw-5r76 and the patching commit at https://github.com/TrustTunnel/TrustTunnel/commit/734bb5cf103b72390a95c853cbf91e699cc01bc0.

Details

CWE(s)

Affected Products

adguard
trusttunnel
≤ 0.9.114

CVEs Like This One

CVE-2026-0686Shared CWE-918
CVE-2025-1849Shared CWE-918
CVE-2025-1848Shared CWE-918
CVE-2026-4528Shared CWE-918
CVE-2025-27777Shared CWE-918
CVE-2026-40242Shared CWE-918
CVE-2026-43526Shared CWE-918
CVE-2026-5418Shared CWE-918
CVE-2023-53899Shared CWE-918
CVE-2025-71259Shared CWE-918

References