Researchers explain vulnerability in firewalls expose

0
259

Researchers have new aanvalsmethodes published a serious vulnerability exposed in the initial sequence numbersprotocol. The hole would be in the firewalls of a large number of mobile providers prevent.

Add initial sequence numbers (ISN) data packets is as a patch introduced to earlier hacks via spoofing on tcp connections. ISN uses pseudowillekeurige serial numbers. A large number of firewalls from well known manufacturers such as Cisco, Juniper and Check Point to implement the ISN and to reject packets that are incorrect. Precisely this property makes the way free for a number of new methods of attack, say researchers from the university of Michigan in a report.

The researchers suggest in the “Off-Path TCP Sequence Number Inference Attack” that they establish a tcp connection could hijack by making use of software on an Android smartphone and a mobile provider that ISN’t enabled on the firewalls. So it was now possible to http connections with services such as Facebook, Twitter and Windows Live Messenger to take over by means of a so-called on-site tcp hijacking attack. This is the original server in the communication put out of play and communicates a victim unnoticed with the attacker.

Another attack can, for example, cookies to steal a user who is logged in on a website, writes Ars Technica. Also would it be possible to with the help of malware from the deemed safe, sandboxed environment of a browser to break to data from other applications loot.

From an examination of the potential vulnerability from 150 mobile providers shows that 48 of them ISN’t enabled on their firewalls. Via an Android application can be a smartphonebezitter also self-testing, or telco is vulnerable; a quick test in the office of Tweakers.net shows that the firewalls of KPN by the app as vulnerable to be qualified, while there is no definitive decision is reached about the network devices from Vodafone. The network of T-Mobile is not tested.

Despite the fact that the majority of the methods of attack only can be used as applications or websites data without encryption send, and the use of the ssl and tls protocols so any protection would offer, the techniques also can be used for dos attacks. In addition, the question of whether mobile providers ISN’t a will to turn off their firewalls because they have a lot of traffic can save by suspicious ip packets at the access point to refuse.