Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    What's Hot

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Home»Cyber Security»BGP Software Vulnerabilities Under the Microscope in Black Hat Session
    Cyber Security

    BGP Software Vulnerabilities Under the Microscope in Black Hat Session

    justmattgBy justmattgJuly 22, 2023No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    [ad_1]

    It’s hard to believe that despite so much manpower, time, and money dedicated to the cybersecurity industry, an entire class of vulnerability can fly under the radar. But in a presentation at next month’s Black Hat USA, researchers from Forescout are going to argue that exactly this has happened with regard to flaws in Border Gateway Protocol (BGP) implementations.

    Few technologies are more central to the Internet than BGP, which manages how packets of data get transmitted between networks. Its position in the global Web has earned it attention from state-level actors, the security community, and three-letter agencies.

    Most of the focus thus far, from every side, has been on the protocol itself. However, “when people go way too deep into one thing, they might leave a blind spot behind,” warns Forescout researcher Daniel dos Santos.

    Like any protocol specification, BGP requires implementations that translate the protocol into code that can run on routers. This software, like any software, is liable to contain vulnerabilities. Yet as dos Santos points out, the last time BGP software vulnerabilities were systematically analyzed on a big stage was two decades ago at Black Hat. “So it’s nice to mark this 20-year anniversary by pointing out how things have changed in the way that BGP is used.”

    Vulnerabilities in BGP Software

    In May, dos Santos and his colleagues published the results of a study into seven BGP implementations: the open source FRRouting, BIRD, and OpenBGPD; and the proprietary MikroTik RouterOS, Juniper Junos OS, Cisco IOS, and Arista EOS. Using fuzzing, or automated analysis, in which invalid inputs are used to test the software for holes, they discovered three new vulnerabilities.

    CVE-2022-40302, CVE-2022-40318, and CVE-2022-43681 were each assigned “medium” CVSS scores of 6.5. All three pertained to the latest version of just one of the implementations, FRRouting, which is used in popular networking solutions such as Nvidia Cumulus. Cumulus, for its part, has been adopted by such organizations as PayPal, AthenaHealth, and Qualcomm.

    At the heart of the vulnerabilities was message parsing. Typically, one would expect a protocol to check that a user is authorized to send a message before processing the message. FRRouting did the reverse, parsing before verifying. So if an attacker could have spoofed or otherwise compromised a trusted BGP peer’s IP address, they could have executed a denial-of-service (DoS) attack, sending malformed packets in order to render the victim unresponsive for an indefinite amount of time.

    FRRouting has since patched all three vulnerabilities.

    Mitigating BGP Software Risks

    In recent years, the profile of organizations that have to think about BGP has expanded.

    “Originally, BGP was only used for large-scale routing — Internet service providers, Internet exchange points, things like that,” dos Santos says. “But especially in the last decade, with the massive growth of data centers, BGP is also being used by organizations to do their own internal routing, simply because of the scale that has been reached,” to coordinate VPNs across multiple sites or data centers, for example.

    Over 317,000 Internet hosts have BGP enabled, most of them concentrated in China (around 92,000) and the US (around 57,000). Just under 2,000 run FRRouting — though not all, necessarily, with BGP enabled — and only around 630 respond to malformed BGP OPEN messages.

    To mitigate any future risks that may arise from BGP software implementations, dos Santos recommends that organizations first develop a clear inventory of the devices running on their networks and the software running on those devices, then focus on always patching as soon as possible.

    Because at the end of the day, dos Santos isn’t overly worried about any one vulnerability, or even three. It’s that “organizations have a much larger attack surface than what they’re really paying enough attention to,” he says. “That includes IoT, operational technology, and now network infrastructure, including BGP.”

    [ad_2]

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAzure AD Token Forging Technique in Microsoft Attack Extends Beyond Outlook, Wiz Reports
    Next Article Apple Threatens to Pull iMessage and FaceTime from U.K. Amid Surveillance Demands
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Demo
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    [mc4wp_form id=3515]
    Demo
    Top Posts

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Latest Reviews
    Cyber Security

    Name That Toon: Last Line of Defense

    justmattgApril 16, 2024

    [ad_1] The enemies are always getting closer, using the same advanced technologies as security pros…

    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    justmattgApril 16, 2024

    [ad_1] Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a “credible” takeover…

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Demo
    MOST POPULAR

    Name That Toon: Last Line of Defense

    April 16, 2024

    California mountain lion P-22 left mark on wildlife conservation

    January 1, 2023

    Congress Again Writes To Home Minister Amit Shah Over Rahul Gandhi’s Security

    January 1, 2023
    OUR PICKS

    Name That Toon: Last Line of Defense

    April 16, 2024

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    [mc4wp_form id=3515]
    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑