IVPN apps security audit for 2022 concluded

IVPN News By Nick Pestell | Posted on April 6, 2022

We’re pleased to announce that an independent security audit of the IVPN apps conducted by Cure53 has concluded.

Since our last audit 12 months ago we have made significant updates to apps on all platforms and judged that a new audit with similar scope is necessary this year.

It’s important to note an audit only provides a snapshot of the code in scope during the period in which it was conducted. We hope that publishing the results increases our customer’s confidence in the security of our apps and shows our commitment to operating transparently wherever possible.

Audit results

Three senior members of the Cure53 team conducted the audit over 13 days in February and early March. A white-box approach was used whereby the auditors had access to our public Github code repositories and a dedicated test environment for backend services. No access to production VPN servers or infrastructure was granted to members of the Cure53 team.

A total of 8 vulnerabilities (1 high, 6 medium, 1 info) were discovered. All except one issue has been resolved, the remaining issue (IVP-04-014 WP, Medium) is complex to resolve without significantly affecting the user experience. The issue relates to how the daemon authenticates requests (from the user interface), which could lead to a malicious app being able to manipulate the VPN tunnel e.g. disconnect. We believe the probability of this being exploited is low, but are committed to finding a solution.

12 miscellaneous issues were discovered, 9 of which have already been resolved and 3 of which we deemed to be very low risk and have accepted it. The Cure53 report is available for those interested in the details. For transparency we decided to publish the full report with only potentially sensitive information removed (internal hostnames, code snippets etc).

Update: We have addressed a vulnerability (IVP-04-014 WP) mentioned in the audit report relating to how the daemon authenticates requests (from the UI), which could lead to a malicious app being able to manipulate the VPN tunnel e.g. disconnect without the users consent. We believe the probability of this being exploited is low, but we committed to finding a solution. Today we’re releasing a new version of the desktop app (3.8.7) with Enhanced App Authentication (EAA) which significantly mitigates this vulnerability.

EAA implements an additional authentication factor between the IVPN app (UI) and the daemon that manages the VPN tunnel. To enable it you will be required to define a separate password and will then be required to manually enter this password when starting the app. This functionality can be configured from the new ‘Advanced’ tab within the GUI or Command-line interface (see ‘ivpn eaa –help).

Commitments going forward

We believe that extensive regular audits are necessary to ensure our customer’s security and continued trust. We are committed to conducting an annual security audit where we will focus on those parts of our infrastructure and apps that we believe to be the most important.

IVPN Team

Audit Security
We invite you to discuss this post in our Reddit community or on Twitter. You can also send your feedback to blog@ivpn.net.
IVPN News

Independent security audit concluded

By Nick Pestell

IVPN News

IVPN applications are now open source

By Viktor Vecsei

Releases

Beta IVPN Linux app released

By Viktor Vecsei

IVPN News

Change of company name to IVPN Limited

Posted on August 10, 2023 by IVPN Staff

We have officially changed the name of the company operating IVPN from Privatus Limited to IVPN Limited. Ownership structure, jurisdiction, address and administrative registration details are unchanged. The reason for this move is to bring our product and brand name into alignment, reducing confusion and providing clarity to customers, partners and other parties about the operator of the service.
IVPN News

Gradual removal of port forwarding from the IVPN service

Posted on June 29, 2023 by IVPN Staff

Protecting the interest of our customers and ensuring the stability of the service have been key principles for IVPN since starting our operations more than ten years ago. To keep delivering on these promises, we have made the decision to gradually phase out the port forwarding feature from the IVPN Pro plan.
Spotted a mistake or have an idea on how to improve this page?
Suggest an edit on GitHub.