Security experts discovered a new set of tunnel protocol vulnerabilities that could expose millions of devices to a broad range of cyberattacks.
According to the research, the issue revolves around internet hosts that fail to verify the sender's identity when handling tunneling packets.
This paves the way for host takeovers, which could allow attackers to breach vulnerable networks and weaponize the hosts for anonymized attacks.
The study, by Top10VPN in collaboration with KU Leuven professor and security researcher Mathy Vanhoef, revealed that the vulnerability affects as many as 4.2 million hosts.
ISP home routers, VPNs, mobile network gateways, content delivery network (CDN) nodes, and core internet users are on the list of devices susceptible to the vulnerability.
As the research pointed out, Brazil, China, France, Japan, and the US are among the most affected countries.
In an attack scenario, threat actors could exploit the vulnerability to turn a susceptible device into a one-way proxy and even use it to launch denial-of-service (DoS) attacks.
The vulnerability stems from the way tunneling protocols such as 4in6, 6in4, IP6IP6 and GRE6 facilitate data transfers between networks without authentication.
Further complicating matters, these protocols typically lack adequate security protocols like IPSec when encrypting traffic.
Perpetrators could even abuse these shortcomings to inject malicious traffic into a tunnel by sending a packet with two IP headers, encapsulated with one of the affected protocols.
Researchers recommend using robust protocols like IPSec or WireGuard to defend against attacks exploiting the vulnerability. In doing so, users would enforce authentication and encryption, filtering out tunneling packets from unknown sources.
Traffic filtering on routers and middleboxes, deep packet inspection (DPI) and blocking all unencrypted tunneling packets are also highly encouraged as mitigation steps.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsDecember 24, 2024
December 19, 2024
November 14, 2024