It is possible to supersede other MAC addresses in the network because the associated switch lacks protection mechanisms, such as PortSecurity.
- Steal sensitive information.
- Facilitate other attacks such as Denial-of-Service DoS attacks, session hijacking and man-in-the-middle MitM attacks.
Set network controls (PortSecurity) in the affected switches.
Attacker from the Internet performing a MitM attack.
⌚ 60 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
All switches should have the port security enabled
server {
index: "index.html";
listen: "localhost:4446 ssl";
server_name: "localhost";
port {
port-number: "4446";
port-security:enabled;
}
}
There is a switch with port-security disabled
server {
index: "index.html";
listen: "localhost:4446 ssl";
server_name: "localhost";
port {
port-number: "4446";
port-security: disabled;
}
}