Thursday, October 24, 2024
News
NEWS HOME
»
PRN INDIA
Armis Discovers "TLStorm 2.0," Five Critical Vulnerabilities in Network Switches, Organizations Around the World at Risk
  SocialTwist Tell-a-Friend  
   

 

Vulnerabilities found in widely-used network switches could allow attackers to bypass security features such as network segmentation to gain access to critical systems

PALO ALTO, Calif., May 3, 2022 /PRNewswire/ -- Armis, the leading unified asset visibility and security platform, today announced the disclosure of five critical vulnerabilities, known as TLStorm 2.0, in the implementation of TLS communications in multiple models of network switches. The vulnerabilities stem from a similar design flaw identified in the TLStorm vulnerabilities (discovered earlier this year by Armis), expanding the reach of TLStorm to millions of additional enterprise-grade network infrastructure devices.

Armis Logo (PRNewsfoto/Armis)

In March 2022, Armis first disclosed TLStorm—three critical vulnerabilities in APC Smart-UPS devices. The vulnerabilities allow an attacker to gain control of Smart-UPS devices from the internet with no user interaction, resulting in the UPS overloading and eventually destroying itself in a cloud of smoke. The root cause for these vulnerabilities was a misuse of NanoSSL, a popular TLS library by Mocana. Using the Armis knowledgebase—a database of more than two billion assets—our researchers identified dozens of devices using the Mocana NanoSSL library. The findings include not only the APC Smart-UPS devices but also two popular network switch vendors that are affected by a similar implementation flaw of the library. While UPS devices and network switches differ in function and levels of trust within the network, the underlying TLS implementation issues allow for devastating consequences.

The new TLStorm 2.0 research exposes vulnerabilities that could allow an attacker to take full control over network switches used in airports, hospitals, hotels, and other organizations worldwide. The affected vendors are Aruba (acquired by HPE) and Avaya Networking (acquired by ExtremeNetworks). We have found that both vendors have switches vulnerable to remote code execution (RCE) vulnerabilities that can be exploited over the network, leading to:

  • Breaking of network segmentation, allowing lateral movement to additional devices by changing the behavior of the switch
  • Data exfiltration of corporate network traffic or sensitive information from the internal network to the Internet
  • Captive portal escape

These research findings are significant as they highlight that the network infrastructure itself is at risk and exploitable by attackers, meaning that network segmentation alone is no longer sufficient as a security measure.

"Research at Armis is driven by one simple purpose: Identify emerging security threats to provide our customers with real-time and continuous protection," said Barak Hadad, Head of Research, Armis. "The TLStorm set of vulnerabilities are a prime example of threats to assets that were previously not visible to most security solutions, showing that network segmentation is no longer a sufficient mitigation and proactive network monitoring is essential. Armis researchers will continue to explore assets across all environments to make sure our knowledgebase of more than two billion assets is sharing the latest threat mitigations to all of our partners and customers."

Captive Portals

A captive portal is the web page displayed to newly-connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a login page that may require authentication, payment, or other valid credentials that both the host and user agree upon. Captive portals provide access to a broad range of mobile and pedestrian broadband services, including cable and commercially provided Wi-Fi and home hotspots, and enterprise or residential wired networks, such as apartment complexes, hotel rooms, and business centers.

Using the TLStorm 2.0 vulnerabilities, an attacker can abuse the captive portal and gain remote code execution over the switch with no need for authentication. Once the attacker has control over the switch, they can disable the captive portal altogether and move laterally to the corporate network.

Vulnerability Details and Affected Devices

Aruba

  • CVE-2022-23677 (9.0 CVSS score)  - NanoSSL misuse on multiple interfaces (RCE)
    • The NanoSSL library mentioned above is used throughout the firmware of Aruba switches for multiple purposes. The two main use cases for which the TLS connection made using the NanoSSL library is not secure and can lead to RCE:
      • Captive portal - A user of the captive portal can take control of the switch prior to authentication.
      • RADIUS authentication client - A vulnerability in the RADIUS connection handling could allow an attacker that is able to intercept the RADIUS connection via a man in the middle attack to gain RCE over the switch with no user interaction.
  • CVE-2022-23676 (9.1 CVSS score)  - RADIUS client memory corruption vulnerabilities
    • RADIUS is an authentication, authorization, accounting (AAA) client/server protocol that allows central authentication for users who attempt to access a network service. The RADIUS server responds to access requests from network services that act as clients. The RADIUS server checks the information in the access request and responds with authorization of the access attempt, a rejection, or a challenge for more information.
    • There are two memory corruption vulnerabilities in the RADIUS client implementation of the switch;   they lead to heap overflows of attacker-controlled data. This can allow a malicious RADIUS server, or an attacker with access to the RADIUS shared secret, to remotely execute code on the switch.

Aruba devices affected by TLStorm 2.0:

  • Aruba 5400R Series
  • Aruba 3810 Series
  • Aruba 2920 Series
  • Aruba 2930F Series
  • Aruba 2930M Series
  • Aruba 2530 Series
  • Aruba 2540 Series

Avaya management interface pre-auth vulnerabilities

The attack surface for all three vulnerabilities of the Avaya switches is the web management portal and none of the vulnerabilities require any type of authentication, making it a zero-click vulnerability group.

  • CVE-2022-29860 (CVSS 9.8) - TLS reassembly heap overflow
    • This is a similar vulnerability to CVE-2022-22805  that Armis found in APC Smart-UPS devices. The process handling POST requests on the webserver does not properly validate the NanoSSL return values, resulting in a heap overflow that can lead to remote code execution.
  • CVE-2022-29861 (CVSS 9.8) - HTTP header parsing stack overflow
    • An improper boundary check in the handling of multipart form data combined with a string that is not null-terminated leads to attacker-controlled stack overflow that may lead to RCE.
  • HTTP POST request handling heap overflow
    • A vulnerability in the handling of HTTP POST requests due to missing error checks of the Mocana NanoSSL library leads to a heap overflow of attacker-controlled length, which may lead to RCE. This vulnerability has no CVE because it was found in a discontinued product line of Avaya meaning no patch will be issued to fix this vulnerability, though Armis data shows these devices can still be found in the wild.

Avaya devices affected by TLStorm 2.0:

  • ERS3500 Series
  • ERS3600 Series
  • ERS4900 Series
  • ERS5900 Series

Updates and Mitigations

Aruba and Avaya collaborated with Armis on this matter, and customers were notified and issued patches to address most of the vulnerabilities. To the best of our knowledge, there is no indication the TLStorm 2.0 vulnerabilities have been exploited.

Organizations deploying impacted Aruba devices should patch impacted devices immediately with patches in the Aruba Support Portal here.

Organizations deploying impacted Avaya devices should check security advisories immediately in the Avaya Support Portal here.

Armis customers can immediately identify devices that are vulnerable in their environments and begin remediation. To speak with an Armis expert and experience our award-winning unified asset visibility and security platform, click here.

Research Presentations

Armis experts will discuss the TLStorm research during the following event:

Additional Resources

About Armis

Armis is the leading unified asset visibility and security platform designed to address the new threat landscape that connected devices create. Fortune 1000 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, Cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS) and 5G. Armis provides passive and unparalleled cybersecurity asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in Palo Alto, California. Visit www.armis.com.

Media Contacts:
Dillon Townsel
Sr. Director, Public & Media Relations
dillon@armis.com
512-571-3455

Logo - https://mma.prnewswire.com/media/519971/Armis_Logo.jpg  

More News by PR Newswire India

/DISREGARD RELEASE: Bybit/

Kushal's Fashion Jewellery Festive Collection, adorned by Tara Sutaria, beautifully combines glamour and elegance

Unilumin Group Signed an Agreement with Saudi Arabia in the Third Belt and Road Forum for International Cooperation

Transport Corporation of India Ltd. (TCI Group) has been recognized as a Maritime Excellence Achiever at GMIS 2023 by The Ministry of Ports, Shipping & Waterways on 19th October 2023

Bitget Introduces 'Futures Quant' With AI Features

Bitget's Q3 Growth: Second-Highest Market Share Surge and Record High for BGB Holders

HarperCollins Publishers India is proud to announce the publication of SPREADING JOY: How Joyalukkas Became the World's Favourite Jeweller by Joy Alukkas with Thomas Scaria and Nidhi Jain

Go Global or Go Home: New Report Reveals Companies Lacking Global Presence Will Lose Growth Opportunities

MOVIN rolls out the second phase of Electric Vehicles in Bengaluru paving the way for greener deliveries in logistics

Motilal Oswal Financial Services Ltd. (MOFSL) launches #CorporateMushaira, an audio-first campaign for the World Investor Week

UBBF 2023 Intelligent IP Network Summit in Dubai an Impressive Success

Placing Them Right: IBS Path to MBA Career Success

HDFC ERGO reiterates its commitment on making health insurance Accessible, Affordable and Convenient with launch of 6 new products and 2 service upgrades

capSpire expands its global footprint with entry into the Singapore market

GTPL Hathway records its highest quarterly revenues from operation

CCTV+: International reporters experience the romance and vitality of Hangzhou, China

STL expands its Enterprise Networking solution portfolio with Estelan

Mantittude: Skincare for Men encourages men to unleash their inner 'Pataka' this Diwali

The 134th Canton Fair Opened with Optimized Structure and Upgraded Scale

MADAME TUSSAUDS SINGAPORE UNVEILS LIFELIKE FIGURE OF CRICKET ICON VIRAT KOHLI AMIDST ICC MEN'S CRICKET WORLD CUP!

Ugreen unveils power solutions and personal data storage at the Gitex Trade Show in United Arab Emirates.

Meridean Overseas Education Consultants Announces Half-Day Leave to Celebrate India vs. Pakistan Cricket Match

Xinhua Silk Road: Huai'an, UNESCO creative city of gastronomy, explores innovative dev. of food industry via premier regional food expo

Xinhua Silk Road: Fengxin County in E. China's Jiangxi celebrates bountiful harvest of kiwifruit

Casio to Release G-SHOCK Watches with Shining Metallic-Colored Dials

UEG Week 2023 : Babies with a low birthweight four times more likely to develop fatty liver disease in later life

CGTN: Diffusion of tea and its culture along the Silk Road

NEOM announces Leyja, its latest sustainable tourism destination

Expand North Star 2023 kicks off in Dubai gathering game-changing start-ups to accelerate on global stage

World Health Summit kicks off in Berlin

Hexaware Technologies announces new office in Dehradun to bolster its global delivery network

Chinese automotive industry has overtaken to supercars

Participants of the Made in Russia business mission to India held more than 150 negotiations with local importers and distributors

Rummy Passion Raises the Bar: Instant Withdrawals Now Available for All Tiers

 
 
TRENDING TOPICS
 
 
CITY NEWS
MORE CITIES
 
 
INDIA WORLD ASIA
Mumbai: Two flight passengers arrested; ...
Karnataka CM Siddaramaiah inspects site ...
Defamation Case: BJP's Praveen Kapoor fi...
Delhi pollution: LG Saxena writes to CM ...
'Civil Defence volunteers to monitor imp...
Fire breaks out at private travel compan...
More...    
 
 Top Stories
"MVA will win in Maharashtra": Shiv... 
"Broad consensus has been achieved"... 
"Shimla Ropeway would be biggest pr... 
Gujarat and Spain strengthen econom... 
SMEs Save an Average of 10-12 Hours... 
Ethika Insurance Broking Leading th... 
Pak: Christian priest urges govt's ... 
IIHM bags the Best Hospitality Mana...