Article contents
.webp&w=3840&q=75)
Discover how vulnerabilities in tunneling protocols expose 4.2M internet hosts to attacks. Learn about the risks, affected regions, and essential steps to protect your network and supply chain.
What happened?
Researchers have discovered vulnerabilities in four tunneling protocols that allowed attackers to hijack 4.2 million internet hosts, including VPN servers, home routers, and enterprise devices. These attacks target both corporate and home networks, letting cybercriminals abuse these devices as one-way proxies for anonymous attacks.
How do these attacks work?
Attackers exploit bugs in tunneling protocols to launch:
These attacks can make malicious traffic appear legitimate by spoofing source addresses, bypassing basic defenses.
Where are these attacks happening?
.webp&w=3840&q=75)
Most of these attacks have occurred in:
- Brazil
- China
- France
- Japan
- The United States
This highlights how widespread and impactful these vulnerabilities are.
What should you do to stay protected?
Experts recommend taking these steps to safeguard your systems:
- Use trusted endpoints: Ensure tunneling traffic is only accepted from verified sources.
- Update software: Apply vendor patches for affected devices and services.
- Harden configurations: Secure your network with strict firewall rules and robust authentication checks.
- Disable unused services: Turn off tunneling services if you don’t need them.
Why this matters for your supply chain and TPRM
Supply chains and third-party relationships depend heavily on secure networks and devices. Vulnerabilities in tunneling protocols can expose businesses to risks, including:
- Compromised vendor systems leading to breaches.
- Disruptions in supply chain operations due to DoS attacks.
- Data theft from insecure IoT devices used in logistics.
How TPRM can help mitigate these risks

By adopting a Third-Party Risk Management (TPRM) approach, businesses can:
- Identify vulnerable vendors: Assess third-party systems for outdated or unpatched devices.
- Enforce security standards: Require vendors to harden their network devices and apply patches.
- Monitor real-time risks: Use tools to track potential threats in your supply chain.
Take the next step with our TPRM services
Our TPRM cloud-solution are designed to protect your supply chain by identifying and managing vendor risks. Whether it’s securing tunneling protocols or safeguarding IoT devices, we help you:
- Evaluate vendor cybersecurity practices.
- Monitor risks continuously.
- Strengthen your overall resilience.
The recent tunneling protocol vulnerabilities are a wake-up call for businesses relying on digital systems. By taking proactive steps to secure your network and embracing TPRM, you can stay ahead of threats while ensuring your supply chain remains robust and resilient.
Want this applied to your supplier ecosystem? See the platform in action and map your top vendor risks live in one walkthrough.