CVE-2026-24904 - TrustTunnel has `client_random_prefix` rule bypass via fragmented or partial TLS...

CVE-2026-24904 - TrustTunnel has `client_random_prefix` rule bypass via fragmented or partial TLS...

CVE ID : CVE-2026-24904 Published : Jan. 29, 2026, 9:19 p.m. | 40 minutes ago Description : TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(...)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP writes), `extract_client_random` returns `None`. In `rules.rs`, `RulesEngine::evaluate` only evaluates `client_random_prefix` when `client_random` is `Some(...)`. As a result, when extraction fails (`client_random == None`), any rule that relies on `client_random_prefix` matching is skipped and evaluation falls through to later rules. As an important semantics note: `client_random_prefix` is a match condition only. It does not mean

CVE Details

Published
Jan. 29, 2026