- VMware vSphere Security Cookbook
- Mike Greer
- 354字
- 2021-08-05 17:16:04
Network vulnerabilities
Network vulnerabilities are the most exploited type of vulnerability due to the large population of devices connected to the Internet. Network vulnerabilities affect endpoint devices, such as web servers, and core devices, such as routers and switches.
Network vulnerabilities across many vendors currently exist. Here are two example vulnerabilities from Cisco. Both represent bugs in the switch-level OS. This vulnerability is listed in the National Vulnerability Database (http://nvd.nist.gov) as follows:
Note
National Cyber Awareness System
Vulnerability summary for CVE-2013-5566
Original release date: 11/08/2013
Last revised: 11/08/2013
Source: US-CERT/NIST
Overview
Cisco NX-OS 5.0 and earlier-on MDS 9000 devices allows remote attackers to cause a denial of service (supervisor CPU consumption) via the Authentication Header (AH) authentication in a Virtual Router Redundancy Protocol (VRRP) frame, also know as Bug ID CSCte27874.
Impact
CVSS severity (Version 2.0):
CVSS v2 sase score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact subscore: 2.9
Exploitability subscore: 10.0
CVSS Version 2 metrics:
Access vector: Network exploitable
Access complexity: Low
Authentication: Not required to exploit
Impact type: This allows the disruption of serviceUnknown
The next vulnerability allows an attacker to cause a denial of service using a modified packet sent to the device. This example is listed in the National Vulnerability Database (http://nvd.nist.gov) as follows:
Note
National Cyber Awareness System
Vulnerability summary for CVE-2013-5565
Original release date: 11/08/2013
Last revised: 11/08/2013
Source: US-CERT/NIST
Overview
The OSPFv3 functionality in Cisco IOS XR 5.1 allows remote attackers to cause a denial of service (a process crash) via a malformed LSA Type-1 packet, also known as Bug ID CSCuj82176.
Impact
CVSS severity (Version 2.0):
CVSS v2 base score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:N/A:P) (legend)
Impact subscore: 2.9
Exploitability subscore: 8.6
CVSS Version 2 metrics:
Access vector: Network exploitable
Access complexity: Medium
Authentication: Not required to exploit
Impact type: This allows the disruption of serviceUnknown
The two examples are very specific, but both reinforce the common threat of denial of service and why frameworks such as defense-in-depth are important. If an attacker is able to cause a denial of service in the network device, a sensor somewhere on the network should be in place to send the proper alert.
- 數(shù)據(jù)恢復方法及案例分析
- 數(shù)字身份與元宇宙信任治理
- 為你護航:網(wǎng)絡空間安全科普讀本(第2版)
- Kali Linux CTF Blueprints
- 網(wǎng)絡空間安全:管理者讀物
- 深入淺出隱私計算:技術解析與應用實踐
- 走進新安全:讀懂網(wǎng)絡安全威脅、技術與新思想
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- Preventing Digital Extortion
- 數(shù)據(jù)安全與隱私計算(第3版)
- 可信計算3.0工程初步(第二版)
- Instant Java Password and Authentication Security
- 數(shù)據(jù)要素安全:新技術、新安全激活新質生產(chǎn)力
- 實用黑客攻防技術
- 博弈論與數(shù)據(jù)安全