- A security researcher has found failures with two of Purevpn Linux customers
- Affected applications can filter IPV6 traffic under certain circumstances and interfere with the local Firewall configuration
- PUREVPN has confirmed that the team is working to patch these defects in mid -October
A security researcher has encountered two problems with the Linux applications of Pure VPN, one that affects IPV6 traffic and the other in the system firewall.
Andreas, an expert in Greek Linux who operates under the name of Anagogistis, discovered that both the GUI V2.10.0 and CLI V2.0.1 versions of the Purevpn Linux customers can filter the IPV6 traffic outside the encrypted tunnel.
When connecting with both Linux VPN applications also interfere with the local Firewall configuration, which “can affect users who depend on the persistent Firewall rules for local security,” Anagogistis points out in his report.
After the allegedly reported findings were unanswered for more than three weeks, Friday (September 19, 2025), PurevpN confirmed that the team is working to patch these failures in mid -October. The supplier also ensures that no other platform (Windows, Macos, Android, iOS) are affected.
Both the security expert and the supplier are suggesting some solutions to all Purevpn Linux users until the solution is launched.
Erroneous IPV6 and Firewall escape configurations: what is at stake for PurevPN users
For example, during the test, leaks are produced after a network transition, such as suspending or resuming an Ethernet connection or alternating Wi-Fi.
“From what I can say, there is no escape during the normal sessions without interruption of the network,” Anagogistis writes.
When an IPV6 filtration occurs, websites or email services could access user locations and track their activities, exactly what you are trying to prevent using the best VPN services.
PUREVPN Client leaked IPv6 in Linux! I sent a detailed report to @purevpncom, but I didn’t get an answer after more than 3 weeks. So I wrote a blog post today with demonstrations and findings to inform other users: https: //t.co/7t2xcuzx23September 17, 2025
Both Linux clients also show signs of erroneous configurations of Firewall.
Specifically, after the application is connected, it replaces the existing Iptable rules (that is, the command lines that define how the Linux nucleus handles the data packages). However, when the user disconnects the Private Network virtual software (VPN), the original device configuration is not restored.
This leaves the system in a different firewall state compared to its initial configuration. Something that, as Purevpn explains, “can leave the device with less protections than the user before connecting to the VPN.”
Purevpn Linux applications were tested and reproduced in Ubuntu 24.04.3 Lts with the core backend 6.8 and Iptable-Nft.
We got in touch with Purevpn to know more about the risk of users and what is behind these defects, but we are still waiting for an answer when writing.
How to stay safe
While the PurevPN team works to publish a technical solution to these vulnerabilities, it must seriously consider some active steps to protect your data.
Purevpn suggests that users should:
- Disable IPv6 manually at the system level.
- Apply the Firewall rules after disconnecting from Purevpn.
- Use connections only for IPV4 when possible until the patchy customer is released.
In general, Purevpn said: “While this problem is limited to Linux customers, we recognize the seriousness of IPv6 leaks and Firewall management. We are moving rapidly to release a solution and reinforce our internal processes to ensure faster recognition and solutions in the future.”
You may also like