The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-35838

CVE-2023-35838: WireGuard Windows Traffic Blocking Flaw

CVE-2023-35838 affects WireGuard client 0.5.3 on Windows, allowing attackers to block traffic to non-RFC1918 IP addresses even while VPN is active. This article covers the technical details, affected versions, and mitigation.

Updated: May 15, 2026

CVE-2023-35838 Overview

CVE-2023-35838 affects the WireGuard client version 0.5.3 on Windows. The client configures the operating system and firewall in a way that blocks traffic to local networks using non-RFC1918 IP addresses. An adjacent network attacker can abuse this misconfiguration to selectively block VPN-tunneled traffic to chosen IP addresses and services while the VPN remains active. The issue is part of the broader TunnelCrack Security Analysis research, which uses this CVE ID to refer generally to the "LocalNet attack resulting in the blocking of traffic." The weakness is classified under [CWE-610] (Externally Controlled Reference to a Resource in Another Sphere).

Critical Impact

An adjacent attacker on the victim's local network can cause selective denial of service for specific destination IPs while the WireGuard tunnel is active.

Affected Products

  • WireGuard for Windows 0.5.3
  • Microsoft Windows (all supported versions running the affected client)
  • Environments where users connect to untrusted local networks using WireGuard

Discovery Timeline

  • 2023-08-09 - CVE-2023-35838 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2023-35838

Vulnerability Analysis

The WireGuard Windows client applies firewall and routing rules intended to prevent local network traffic from leaking outside the VPN tunnel. The implementation assumes local networks use RFC1918 private address ranges such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. When an attacker-controlled Wi-Fi or wired network advertises a non-RFC1918 subnet, the client's rules cause matching traffic to be blocked rather than routed correctly through the tunnel.

The result is targeted availability loss. An adversary connected to the same access network as the victim can force specific destination addresses or services to become unreachable, even with the VPN reportedly active and connected. Confidentiality and integrity of tunneled data are not affected by this specific CVE.

Root Cause

The root cause is insecure default configuration of the host firewall and routing policy. The client trusts router-supplied network parameters when constructing local-network exception rules. Because non-RFC1918 ranges are treated as legitimate local networks, malicious DHCP or router advertisements can manipulate the firewall scope. This maps to [CWE-610], where a resource reference is controlled by an external entity.

Attack Vector

Exploitation requires adjacent network access and minimal user interaction, typically the victim connecting to a hostile network. The attacker operates a rogue access point or DHCP server that assigns a non-RFC1918 subnet covering the target IP addresses. The WireGuard client installs firewall rules that block traffic to that subnet, achieving the LocalNet effect. Full technical detail is published in the TunnelCrack Security Analysis. Related vendor guidance is available in the SonicWall Vulnerability Advisory SNWLID-2023-0015.

Detection Methods for CVE-2023-35838

Indicators of Compromise

  • DHCP leases on client systems assigning non-RFC1918 subnets such as public IP ranges to a local interface.
  • Windows Filtering Platform (WFP) rules added by WireGuard that scope to attacker-controlled non-private CIDR blocks.
  • Sudden unreachability of specific public destinations only while the WireGuard tunnel is up.

Detection Strategies

  • Inspect endpoint network configuration for adapter subnets outside RFC1918 ranges when connected to untrusted Wi-Fi.
  • Correlate VPN connection events with DHCP option logs and routing table changes on Windows hosts.
  • Compare expected destination reachability before and after VPN establishment to flag selective traffic blocking.

Monitoring Recommendations

  • Centralize Windows DHCP client and WFP filter events for review across mobile and remote endpoints.
  • Alert on WireGuard client version 0.5.3 still deployed in the environment.
  • Monitor for repeated, location-specific VPN reachability failures reported by end users.

How to Mitigate CVE-2023-35838

Immediate Actions Required

  • Upgrade the WireGuard Windows client to a version newer than 0.5.3 that addresses the LocalNet attack class.
  • Inventory endpoints running wireguard:wireguard 0.5.3 and prioritize remote and travel-use laptops.
  • Educate users about the risks of connecting to untrusted public Wi-Fi while relying on VPN protection.

Patch Information

Review the WireGuard Official Website for the current Windows client release and changelog. Organizations using SonicWall products that bundle or reference WireGuard components should consult the SonicWall Vulnerability Advisory SNWLID-2023-0015 for fixed versions and configuration guidance.

Workarounds

  • Restrict VPN use to known, trusted networks until clients are upgraded.
  • Disable local network access on the VPN client where the feature is configurable.
  • Enforce always-on VPN policies that drop traffic to non-tunneled destinations.
  • Deploy host firewall policy that blocks adapter configurations using non-RFC1918 ranges on untrusted SSIDs.
bash
# Configuration example: identify WireGuard 0.5.3 installations on Windows
Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* `
  | Where-Object { $_.DisplayName -like 'WireGuard*' -and $_.DisplayVersion -eq '0.5.3' } `
  | Select-Object DisplayName, DisplayVersion, InstallLocation

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechWireguard

  • SeverityMEDIUM

  • CVSS Score5.7

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-610
  • Technical References
  • SonicWall Vulnerability Advisory SNWLID-2023-0015

  • TunnelCrack Security Analysis

  • WireGuard Official Website
  • Related CVEs
  • CVE-2026-27899: WireGuard Portal Privilege Escalation Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English