Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      AI and its impact on the developer experience, or ‘where is the joy?’

      July 23, 2025

      Google launches OSS Rebuild tool to improve trust in open source packages

      July 23, 2025

      AI-enabled software development: Risk of skill erosion or catalyst for growth?

      July 23, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Power bank slapped with a recall? Stop using it now – here’s why

      July 23, 2025

      I recommend these budget earbuds over pricier Bose and Sony models – here’s why

      July 23, 2025

      Microsoft’s big AI update for Windows 11 is here – what’s new

      July 23, 2025

      Slow internet speed on Linux? This 30-second fix makes all the difference

      July 23, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Singleton and Scoped Container Attributes in Laravel 12.21

      July 23, 2025
      Recent

      Singleton and Scoped Container Attributes in Laravel 12.21

      July 23, 2025

      wulfheart/laravel-actions-ide-helper

      July 23, 2025

      lanos/laravel-cashier-stripe-connect

      July 23, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      ‘Wuchang: Fallen Feathers’ came close to fully breaking me multiple times — a soulslike as brutal and as beautiful as it gets

      July 23, 2025
      Recent

      ‘Wuchang: Fallen Feathers’ came close to fully breaking me multiple times — a soulslike as brutal and as beautiful as it gets

      July 23, 2025

      Sam Altman is “terrified” of voice ID fraudsters embracing AI — and threats of US bioweapon attacks keep him up at night

      July 23, 2025

      NVIDIA boasts a staggering $111 million in market value per employee — since it became the world’s first $4 trillion company

      July 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Debug Code in ExpressVPN Windows App Caused IP Leak via RDP Port

    Debug Code in ExpressVPN Windows App Caused IP Leak via RDP Port

    July 22, 2025

    ExpressVPN

    ExpressVPN has alerted users of a security issue in its Windows application that allowed certain Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ IP addresses. This vulnerability primarily affected TCP traffic routed over port 3389, the standard port for RDP connections, which are often used in enterprise environments rather than by typical consumers. 

    The issue was discovered after a tip from a security researcher, prompting ExpressVPN’s engineers to release an urgent fix. According to the company, “following a tip from a security researcher about how certain Remote Desktop traffic was being routed,” they deployed a security update to their Version 12 Windows app. This update, Version 12.101.0.45, not only fixed the vulnerability but also included other general improvements and routine bug fixes. 

    Nature of the ExpressVPN Vulnerability and How It Was Addressed 

    The problem was traced back to debug code originally meant for internal testing that mistakenly shipped with production versions of the app, specifically from versions 12.97 to 12.101.0.2-beta. This debug code caused traffic over TCP port 3389 to be routed outside the VPN tunnel. ExpressVPN explained, “With help from our bug bounty community, we identified and fixed an issue in certain recent versions of our Windows app where traffic over TCP port 3389 wasn’t being routed through the VPN tunnel as expected.” 

    This vulnerability meant that when a user connected through RDP, their traffic wasn’t protected by the VPN routing as it should have been. While the encryption of the traffic itself remained intact, the leak allowed observers such as Internet Service Providers (ISPs) or local network eavesdroppers to see that the user was connected to ExpressVPN and accessing specific remote servers via RDP, information normally shielded by the VPN. 

    The flaw was responsibly reported by security researcher Adam-X through ExpressVPN’s bug bounty platform on April 25. The company responded, confirming and triaging the issue within hours and releasing a fix five days later. The fixed rollout was completed across all distribution channels, and the researcher confirmed the resolution soon after.  

    Assessing the Impact and Risks 

    Although the issue could theoretically affect any TCP traffic over port 3389, not just RDP sessions, the typical ExpressVPN user is unlikely to encounter this vulnerability. The company emphasized that “this scenario is uncommon for most users (RDP is primarily used in enterprise environments),” and given that ExpressVPN’s user base mainly consists of individual consumers rather than enterprise clients, the number of potentially impacted users was probably small. 

    For a malicious actor to exploit the vulnerability, they would need to be aware of the bug and find a way to trigger traffic over port 3389, perhaps by tricking a user into visiting a compromised website or executing a drive-by attack. Even in such cases, ExpressVPN clarified that “the exposure would have been limited to the user’s real IP address. It did not reveal their browsing activity or compromise the encryption of any traffic, including RDP sessions.” 

    Conclusion 

    To prevent similar issues, ExpressVPN is enhancing its internal testing processes, including “improving automated tests to flag and remove test settings earlier in development,” reducing human error, and helping ensure that debug code does not reach production. 

    Users are strongly advised to update to the latest app version to maintain full protection and ensure all traffic, including RDP over port 3389, is properly routed through the VPN tunnel.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCredential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate
    Next Article How to Advance from SOC Manager to CISO?

    Related Posts

    Development

    Singleton and Scoped Container Attributes in Laravel 12.21

    July 23, 2025
    Development

    wulfheart/laravel-actions-ide-helper

    July 23, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-34030 – Apache sar2html OS Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Trojanized Text Editor Software Used in Targeted Uyghur Spy Campaign

    Development

    CVE-2025-48988 – Apache Tomcat Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Windows 11 Now Runs on iPad in EU via UTM Virtual Machine

    Security

    Highlights

    The Impact of AI on Compliance and Risk Management for Mainframe Environments

    May 22, 2025

    Mainframe environments remain critical infrastructure for many organizations, processing millions of sensitive transactions daily while…

    One of my favorite action games of all time is free this week, so grab it while you can and revel in the carnage

    May 17, 2025

    Windows 11 Search will soon let you install your favorite apps from Microsoft Store

    May 8, 2025

    ASUS Armoury Crate bug lets attackers get Windows admin privileges

    June 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.