CVE-2022-41925: CWE-352: Cross-Site Request Forgery (CSRF) in tailscale tailscale
A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables. An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop. All Tailscale clients prior to version v1.32.3 are affected. Upgrade to v1.32.3 or later to remediate the issue.
AI Analysis
Technical Summary
CVE-2022-41925 is a medium-severity vulnerability affecting Tailscale clients prior to version 1.32.3. The vulnerability arises from a Cross-Site Request Forgery (CSRF) issue combined with DNS rebinding attacks targeting the Tailscale peer API. Tailscale is a popular mesh VPN service that allows devices to connect securely over the internet by creating a virtual private network (VPN) called a tailnet. The peer API is a local interface used by the Tailscale client to manage connections and share information between nodes. Due to improper validation, a malicious website visited by a user on a node running a vulnerable Tailscale client can perform DNS rebinding to redirect requests intended for the peer API to an attacker-controlled DNS server. This enables the attacker to send unauthorized requests to the peer API from the victim’s browser context. Exploiting this, the attacker can access sensitive environment variables on the node, including credentials such as Tailscale authentication keys. These keys can be leveraged to add rogue nodes to the victim’s tailnet, potentially compromising the entire network. Additionally, the attacker can enumerate other nodes in the tailnet and misuse features like Taildrop to send files, further escalating the impact. The attack does not require prior authentication but does require the victim to visit a malicious website, making user interaction necessary. The vulnerability is mitigated by upgrading to Tailscale version 1.32.3 or later, where proper protections against DNS rebinding and CSRF have been implemented. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using Tailscale, this vulnerability poses a significant risk to the confidentiality and integrity of their internal networks. Unauthorized access to Tailscale environment variables can lead to credential theft, allowing attackers to infiltrate the tailnet by adding malicious nodes. This can result in lateral movement within the network, data exfiltration, and disruption of secure communications. Organizations relying on Tailscale for secure remote access or inter-office connectivity may face exposure of sensitive internal resources. The ability to enumerate nodes and transfer files via Taildrop further increases the risk of data leakage and insider-like attacks. Given that exploitation requires user interaction through visiting a malicious website, phishing or social engineering campaigns could be used as attack vectors. The vulnerability could particularly impact sectors with high reliance on secure VPNs, such as finance, technology, and critical infrastructure within Europe. The medium severity rating reflects the need for prompt patching to prevent potential network compromise and data breaches.
Mitigation Recommendations
Immediately upgrade all Tailscale clients to version 1.32.3 or later to ensure the vulnerability is patched. Implement network-level DNS filtering to block access to known malicious domains and prevent DNS rebinding attacks. Use browser security features or extensions that restrict or monitor DNS rebinding attempts, especially on devices running Tailscale clients. Educate users about the risks of visiting untrusted websites and implement phishing awareness training to reduce the likelihood of user interaction with malicious sites. Restrict environment variable exposure by running Tailscale clients with the least privilege necessary and avoid storing sensitive credentials in environment variables where possible. Monitor tailnet activity for unusual node additions or unexpected file transfers via Taildrop to detect potential exploitation attempts. Consider network segmentation and zero-trust principles to limit the impact of compromised nodes within the tailnet.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland, Switzerland, Belgium, Denmark
CVE-2022-41925: CWE-352: Cross-Site Request Forgery (CSRF) in tailscale tailscale
Description
A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables. An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop. All Tailscale clients prior to version v1.32.3 are affected. Upgrade to v1.32.3 or later to remediate the issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-41925 is a medium-severity vulnerability affecting Tailscale clients prior to version 1.32.3. The vulnerability arises from a Cross-Site Request Forgery (CSRF) issue combined with DNS rebinding attacks targeting the Tailscale peer API. Tailscale is a popular mesh VPN service that allows devices to connect securely over the internet by creating a virtual private network (VPN) called a tailnet. The peer API is a local interface used by the Tailscale client to manage connections and share information between nodes. Due to improper validation, a malicious website visited by a user on a node running a vulnerable Tailscale client can perform DNS rebinding to redirect requests intended for the peer API to an attacker-controlled DNS server. This enables the attacker to send unauthorized requests to the peer API from the victim’s browser context. Exploiting this, the attacker can access sensitive environment variables on the node, including credentials such as Tailscale authentication keys. These keys can be leveraged to add rogue nodes to the victim’s tailnet, potentially compromising the entire network. Additionally, the attacker can enumerate other nodes in the tailnet and misuse features like Taildrop to send files, further escalating the impact. The attack does not require prior authentication but does require the victim to visit a malicious website, making user interaction necessary. The vulnerability is mitigated by upgrading to Tailscale version 1.32.3 or later, where proper protections against DNS rebinding and CSRF have been implemented. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using Tailscale, this vulnerability poses a significant risk to the confidentiality and integrity of their internal networks. Unauthorized access to Tailscale environment variables can lead to credential theft, allowing attackers to infiltrate the tailnet by adding malicious nodes. This can result in lateral movement within the network, data exfiltration, and disruption of secure communications. Organizations relying on Tailscale for secure remote access or inter-office connectivity may face exposure of sensitive internal resources. The ability to enumerate nodes and transfer files via Taildrop further increases the risk of data leakage and insider-like attacks. Given that exploitation requires user interaction through visiting a malicious website, phishing or social engineering campaigns could be used as attack vectors. The vulnerability could particularly impact sectors with high reliance on secure VPNs, such as finance, technology, and critical infrastructure within Europe. The medium severity rating reflects the need for prompt patching to prevent potential network compromise and data breaches.
Mitigation Recommendations
Immediately upgrade all Tailscale clients to version 1.32.3 or later to ensure the vulnerability is patched. Implement network-level DNS filtering to block access to known malicious domains and prevent DNS rebinding attacks. Use browser security features or extensions that restrict or monitor DNS rebinding attempts, especially on devices running Tailscale clients. Educate users about the risks of visiting untrusted websites and implement phishing awareness training to reduce the likelihood of user interaction with malicious sites. Restrict environment variable exposure by running Tailscale clients with the least privilege necessary and avoid storing sensitive credentials in environment variables where possible. Monitor tailnet activity for unusual node additions or unexpected file transfers via Taildrop to detect potential exploitation attempts. Consider network segmentation and zero-trust principles to limit the impact of compromised nodes within the tailnet.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6d78
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:53:17 PM
Last updated: 8/19/2025, 6:26:44 PM
Views: 16
Related Threats
CVE-2025-50864: n/a
HighCVE-2025-51991: n/a
HighCVE-2025-51990: n/a
HighCVE-2025-55482: n/a
HighCVE-2025-43748: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.