Business information leak - NAC

Business information leak - NAC

Description

An organization can set its own policies for each user with NAC, it could result in too much information that sometimes overload it. On the other hand, attackers use malicious devices, they install malicious devices between a legitimate device and the switch, compromising and allowing information leakage.

Impact

- Disrupt the NAC infrastructure to make it inaccessible.
- Circumvent the NAC solution by using a man-in-the-middle attack.

Recommendation

- Implement NAC can drastically improve an organizations network security posture.
- A clean NAC solution can greatly increase the difficulty of a successful attack.
- MAC-based NAC should not be used due to it is easy for a hacker to spoof a MAC address.
- Ensure that no devices with access to the internal client network are used in publicly accessible areas.

Threat

Anonymous attacker from the Internet performing man-in-the-middle attack.

Expected Remediation Time

⌚ 60 minutes.

Score

Default score using CVSS 3.1. It may change depending on the context of the src.

Base

  • Attack vector: P
  • Attack complexity: L
  • Privileges required: N
  • User interaction: N
  • Scope: U
  • Confidentiality: L
  • Integrity: L
  • Availability: N

Temporal

  • Exploit code maturity: X
  • Remediation level: X
  • Report confidence: X

Result

  • Vector string: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X
  • Score:
    • Base: 3.5
    • Temporal: 3.5
  • Severity:
    • Base: Low
    • Temporal: Low

Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: P
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): L
  • Integrity (VI): L
  • Availability (VA): N
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: X

Result 4.0

  • Vector string: CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X
  • Score:
    • CVSS-BT: 2.4
  • Severity:
    • CVSS-BT: Low

Compliant code

The NAC policy is correctly configured

                config user nac-policy
  Description: Configure NAC policy
  edit 
    set description {description}
    set category [device]
    set status [enable]
    set host {string}
    set user {string}
  next
end

            

Non compliant code

The NAC policy is based on MAC

                config user nac-policy
  Description: Configure NAC policy
  edit 
    set description {description}
    set category [device]
    set status [enable]
    set mac {mac-address}
    set switch-mac-policy {switchPolicy}
  next
end

            

Requirements

Fixes

Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.