Independent auditors inspect NordVPN's security once again – here's what they found

NordVPN on a mobile phone
(Image credit: Pixabay)

  • NordVPN completed a large-scale security audit
  • Cure53 conducted the audit and found no "critical" flaws
  • NordVPNensures that all identified issues have already been fixed

NordVPN has passed its latest and most extensive security check-up, according to a new report from independent auditors Cure53.

ThechRadat's top-rated best VPN service tasked the respected German firm with a deep dive into its entire ecosystem. After months of testing by a large team of experts, no critical vulnerabilities were discovered across any of its services.

The audit's findings are a significant vote of confidence for a service that millions of users trust with their digital privacy. "Security is built into everything we create at NordVPN," said Marijus Briedis, CTO of NordVPN. "We are proud that the audit found no critical vulnerabilities, and our teams have already acted on the findings to further tighten our internal protections."

A deeper and broader assessment

Conducted throughout May, June, and October 2025, the evaluation was broader in scope than in previous years. It involved a mixture of white-box and gray-box penetration tests, where nineteen senior testers from Cure53 were given deep access to NordVPN's systems.

The sweeping audit examined nearly every corner of the service, leaving nothing to chance. It started with NordVPN’s suite of applications, which spans all major platforms, Android, iOS, Windows, macOS, and Linux, along with browser extensions for Chrome, Edge, and Firefox.

From there, auditors delved into the core infrastructure, taking an in-depth look at VPN servers, containerized services, and the internal access controls that safeguard the server environment.

The review also put the authentication systems through rigorous testing, ensuring that NordAccount and its multi-factor authentication (MFA) protections could withstand even the most persistent bypass attempts.

Key findings and immediate fixes

While no system is ever perfect, Cure53's report was overwhelmingly positive. The auditors highlighted several areas of strength, confirming that NordVPN's mobile and desktop apps follow strict security practices, including secure data storage and robust firewall logic. They also found the server infrastructure to be properly hardened with strong container isolation.

The audit did, however, flag some items for attention. Across the two reports, Cure53 identified a total of five high-severity vulnerabilities. Three of these were found in the applications, related to potential command injection, session management, and a VPN bypass, while the remaining two concerned privilege escalation paths within the server infrastructure.

Crucially, NordVPN’s engineers addressed the issues immediately, and Cure53 has independently verified that all the fixes are working as intended. This rapid response is precisely why VPN audits matter; they allow providers to find and patch potential weaknesses before they can be exploited.

This commitment to continuous improvement is a core part of NordVPN’s strategy. This latest evaluation follows a series of other independent reports, including a no-logs audit by Deloitte that verified the company's privacy claims.

As Briedis concluded, "Security work never ends, and each new assessment helps us make the service even safer. The latest test results show that NordVPN’s applications and systems remain well-protected, and we will continue to improve them for the benefit of all users who rely on our service."


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!


TOPICS
Rene Millman
Contributing Writer

Rene Millman is a seasoned technology journalist whose work has appeared in The Guardian, the Financial Times, Computer Weekly, and IT Pro. With over two decades of experience as a reporter and editor, he specializes in making complex topics like cybersecurity, VPNs, and enterprise software accessible and engaging.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.