Wednesday, November 21, 2018

SD-WAN and Elon Musk at #zeronights

The goal of this talk is to provide the results of passive and active fingerprinting for SD-WAN systems using a common threat intelligence approach. We explore Internet-based and cloud-based publicly available SD-WAN systems using the well-known «Shodan» and «Censys» search engines and custom developed automation tools and show that most of the SD-WAN systems have known vulnerabilities related to outdated software and insecure configuration. 

As presented at Zeronights 2018 by Anton Nikolaev, Denis Kolegov, Oleg Broslavsky.

Monday, November 12, 2018

SD-WAN Threat Landscape

The goal of this paper is to understand SD-WAN threats using practical approach. We describe basic SD-WAN features and components, investigate an attack surface, explore various vendor features and their security, explain threats and vulnerabilities found in SD-WAN products. We also extend existing SDN threat models by describing new potential threats and attack vectors, provide examples, and consider high-level approaches for their mitigations.

Wednesday, November 7, 2018

WebGoat.SDWAN.Net in Depth

SD-WAN New Hop talk by Denis Kolegov, Oleg Broslavsky as presented at Power of Community 2018 conference, Seoul, Korea. [1] [2]

In this presentation, we disclose a set of vulnerabilities in widespread and most popular SD-WAN products including Citrix NetScaler and Silver Peak EdgeConnect. We present the new results of our research, consider some technical details of the insecure design and found vulnerabilities, and describe different attack scenarios that may allow an attacker to compromise SD-WAN control and data planes.


Citrix NetScaler SD-WAN vulnerabilities details

On CTX236992, mode details and exploitation vectors by Sergey Gordeychik, Denis Kolegov, Nikita Oleksov, Nikolay Tkachenko, Oleg Broslavsky

Unauthenticated Access to Munin Service
Incorrect Access Controls
Cross-Site Request Forgery
Use of CakePHP Component with Known Vulnerabilities
Cross-Site Scripting(s)
Path Traversal(s)
SQL Injection(s)
Slow HTTP DoS Attacks
Session ID Leakage
Sudo Misconfiguration
OS Command Injection(s)

Thursday, November 1, 2018

SD-WAN Infiltrator


SD-WAN Infiltrator is an NSE script to automatically discover SD-WAN nodes in a local network. It uses SD-WAN Census Database.
Useful for pentest/internal network assessment.
Special release for CodeBlue Security Conference, Tokyo, Japan.