"computerworlduk",
printers, routers, IP cameras, sensors and other Internet-connected
devices are increasingly used to launch large distributed denial of
service attacks, security firm Prolexic warned in a report this week.
Attackers are taking advantage of inherent vulnerabilities in some
common network protocols used by these devices to turn them into
malicious bots, Prolexic said.
The report identifies three vulnerabilities in particular that are
being used in DDoS attacks: Simple Network Management Protocol (SNMP),
Network Time Protocol (NTP) and Character Generator Protocol (CHARGEN).
All three protocols are ubiquitous across the Internet and in
out-of-the-box devices and system configurations, said Terrence Gareau,
principal security architect for Prolexic.
According to Prolexic, there are several security problems with SNMP.
Some versions of the protocol transmit data in human readable form and
are therefore vulnerable to interception and data modification attacks.
The protocol is also vulnerable to IP spoofing because the origin of
transmission of an SNMP request cannot be verified. All versions of SNMP
are also vulnerable to "brute force" attacks, the company said.
Attackers can take advantage of such flaws to take control of
network-attached devices and use them to launch denial of service
attacks, Gareau said. As a result, attackers can generate huge volumes
of DDoS traffic with relatively small SNMP requests, Gareau said.
Organizations that want to reduce the risk of their devices being
used to launch DDoS attacks should disable SNMP if it is not needed,
restrict SNMP access via access control lists, and disable read and
write SNMP access unless it is absolutely needed, Prolexic said in its
report. Companies should also consider stronger authentication measures
to control access to SNMP devices.
Similarly, problems with the Network Time Protocol can result in
systems that are co-opted into a DDoS attack, the company said. NTP is
used to synchronize network clocks and for timestamp messages. As with
SNMP, attackers can launch multiple requests for NTP updates from
multiple hosts and direct all the responses to a target computer.
Meanwhile, vulnerabilities in the CHARGEN protocol, which is found in
remote debugging and measurement tools, allows attackers to craft
malicious packets and have them directed to a target. Companies that use
this protocol should review its use and eliminate it if it isn't
needed, according to Prolexic.
No comments:
Post a Comment