Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025

    Link Rebound 4% as Chenlink Roll Out Data Stream for US Equity and ETF

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Expressvpn bug remote desktop sessions user IPS leaked
    Security

    Expressvpn bug remote desktop sessions user IPS leaked

    PineapplesUpdateBy PineapplesUpdateJuly 21, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Expressvpn bug remote desktop sessions user IPS leaked
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Expressvpn bug remote desktop sessions user IPS leaked

    ExpressVN has fixed a defect in its Windows Client, highlighting the actual IP address of users, causing a remote desktop protocol (RDP) traffic to bypass the virtual private network (VPN) tunnel.

    One of the major complexes of VPN is to mask the user’s IP address, making users online anonymous, and in some cases, bypassing the sensorship. Failing to do so is a serious technical failure for a VPN product.

    ExpressVN is a major VPN service provider, which is constantly rated between top VPN services, and is used by millions worldwide. It uses the RAM-Caval server that users do not maintain data and follow an audited no-logs policy.

    On April 25, 2025, a security researcher, known as “Adam-X”, reported a vulnerability through the Bag Bunty program of ExpressVN, in which RDP and other TCP traffic was sent to Port 3389.

    On investigating, the ExpressVN team found that the issue is due to the remains of the dibg code used for internal testing, which is accidentally included in the production build, in particular, from 12.97 (released four months ago) to 12.101.0.2-bit.

    “If a user has established a connection using RDP, it can bypass the traffic VPN tunnel,” Expressed expresswpn in an announcement,

    “It did not affect encryption, but it meant that traffic from RDP connection was not routed as expected through expresswpn.”

    “As a result, an observer, such as an ISP or a person on the same network, could not only be seen that the user was associated with expresswpn, but also that they were reaching the specific remote servers on RDP – which would be normally preserved.”

    A patch was provided with the ExpressVN version 12.101.0.45, released on June 18, 2025.

    The privacy firm notes that the security lapse did not compromise the encryption on the tunnels, and the leakage landscape only affects those using the remote desktop protocol (RDP), which they consider to be low for their customers.

    “As mentioned above, in practice, this issue has generally affected users actively using RDP – a protocol that is usually not used by specific consumers,” reads the advisor to expressVPN.

    “Given that the user base of expresswpn is mainly composed of individual users rather than enterprise customers, the number of affected users is likely to decrease.”

    RDP is a Microsoft Network Protocol that enables users to control the Windows system on a network from a distance, used by IT administrators, distance workers and enterprises.

    Nevertheless, it is recommended that the users upgrade their Windows clients in 12.101.0.45 version for final security.

    ExpressVPN suggests that it will strengthen its internal build check to prevent a similar bug from being introduced in production in future, including increased automation in growth testing.

    Last year, ExpressVPN faced another issue, leaking DNS request when users enabled the ‘slip tunling’ feature on the Windows client.

    The facility was temporarily disabled until a fix was implemented in future release.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    Bug Desktop ExpressVPN IPS Leaked remote sessions user
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRay-Ban Meta vs. Okle Meta Smart Glass: Differences and Equality
    Next Article Gamesir T7 Pro Floral Review: Beautiful Design, but does not exclude other gamers controllers
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Security

    Fashion giant channel hit salesforce data theft attacks

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025

    Link Rebound 4% as Chenlink Roll Out Data Stream for US Equity and ETF

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.