Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Testing Lab Exposes Major Flaws in Industry Leading Firewalls

A new report from independent security testing organization NSS Labs, warns of two major flaws affecting industry leading firewalls, including a sneak attack that can go unnoticed by most organizations.

A new report from independent security testing organization NSS Labs, warns of two major flaws affecting industry leading firewalls, including a sneak attack that can go unnoticed by most organizations.

In its Network Firewall Comparative Group Test Report for Q1 of 2011, NSS Labs said it discovered two serious flaws in industry leading firewalls, despite their certification by two other major certification bodies.

1. Stability Problem – By sending certain sequences of content to a firewall’s external interface, an attacker can cause it to crash, essentially creating a denial of service condition. On one firewall that NSS tested, when it crashed, it gave attacker outside root access to the firewall without requiring a password.

2. TCP Split Handshake Attack – NSS says this attack is the TCP Equivalent of IP Spoofing. The issue permits an external attacker to trick the firewall into allowing access inside the firewall as a trusted client. This TCP split handshake attack has been publicly known for over a year, and all firewalls should defend against it, but this isn’t the case. In fact, 5 of the 6 firewalls tested FAILED to detect and block the TCP Split Handshake Attack.

Products tested in the report include:

• Check Point Power-1 11065

• Cisco ASA 5585

• Fortinet Fortigate 3950

Advertisement. Scroll to continue reading.

• Juniper SRX 5800

• Palo Alto Networks PA-4020

• Sonicwall E8500

According to Rick Moy, President of NSS Labs, this is important news. “The discoveries that we made in our testing are quite significant. They undermine the false sense of confidence that organizations have had in their firewalls. I think that’s pretty timely considering the number of breaches that been picked up in the media over the last couple weeks.”

Moy also said these types of attacks are difficult to monitor and while technically they can be detected, realistically, it’s quite challenging. “In order to detect the attacks, one would have to have some kind of IDS device on the outside of the firewall looking at low level tcp handshaking in order to establish the session,” Moy said. “Most of the logging done by firewalls and other security devices is done at a high level, so it’s really a sneak attack than would go unnoticed by most organizations.”

“This is by no means a zero day vulnerability, it’s something that’s been documented and publicized in the community for at least a year. We were quite surprised that it wasn’t address by the leading manufacturers,” Moy said. The only firewall tested that passed the TCP split handshake attack was the Check Point Power-1 11065.

NSS Labs said the discoveries surrounding the issues were made in January, and that it planned to release the news at the RSA Conference in February. After working with vendors and giving what it thinks was plenty of time to remediate the issues, NSS is coming forward with its report. “More than sixtry days later, we figured the news is out and the bad guys have known about the attacks for some cases years.  Its important to let the good guys who have these firewalls know bout the problem in their devices so they can remediate themselves and or so they can put pressure on the vendors to release fixes,” Moy told SecurityWeek.

Key findings from the report show:

• Three out of six firewall products failed to remain operational when subjected to our stability tests. This lack of resiliency is alarming, especially considering the tested firewalls were ICSA Labs and Common Criteria certified.

• Five out of six vendors failed to correctly handle the TCP Split Handshake spoof (aka Sneak ACK attack), thus allowing an attacker to bypass the firewall.

• Measuring performance based upon RFC-2544 (UDP) does not provide an accurate representation of how the firewall will perform in live real-world environments.

Firewalls are the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of perimeter security and are considered to be commodity products.

What should a user do if they have a firewall affected by this issue?

According to Moy, it really depends on which firewall you have. “Some of them have remediation steps that a firewall admin can take to close the hole,” Moy said. But Moy also warns to be cautious when making such adjustments to the firewalls configurations. “These may have repercussions on their network performance or ability to communicate with certain types of devices, so we recommend that they perform some type of testing internally before implementing.”

Two devices don’t have remediation at this time.

“IT organizations worldwide have relied on third-party testing and been misled,” said Vik Phatak, CTO, NSS Labs. “These test results point towards the need for a much higher level of continuous testing of network firewalls to ensure they are delivering appropriate security and reliability.”

NSS Labs said that all leading network firewall vendors were invited to participate in the test at no cost. All testing was conducted independently and was not paid for by any vendor.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.