Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Testing Lab Exposes Major Flaws in Industry Leading Firewalls

A new report from independent security testing organization NSS Labs, warns of two major flaws affecting industry leading firewalls, including a sneak attack that can go unnoticed by most organizations.

A new report from independent security testing organization NSS Labs, warns of two major flaws affecting industry leading firewalls, including a sneak attack that can go unnoticed by most organizations.

In its Network Firewall Comparative Group Test Report for Q1 of 2011, NSS Labs said it discovered two serious flaws in industry leading firewalls, despite their certification by two other major certification bodies.

1. Stability Problem – By sending certain sequences of content to a firewall’s external interface, an attacker can cause it to crash, essentially creating a denial of service condition. On one firewall that NSS tested, when it crashed, it gave attacker outside root access to the firewall without requiring a password.

2. TCP Split Handshake Attack – NSS says this attack is the TCP Equivalent of IP Spoofing. The issue permits an external attacker to trick the firewall into allowing access inside the firewall as a trusted client. This TCP split handshake attack has been publicly known for over a year, and all firewalls should defend against it, but this isn’t the case. In fact, 5 of the 6 firewalls tested FAILED to detect and block the TCP Split Handshake Attack.

Products tested in the report include:

• Check Point Power-1 11065

• Cisco ASA 5585

• Fortinet Fortigate 3950

• Juniper SRX 5800

• Palo Alto Networks PA-4020

• Sonicwall E8500

According to Rick Moy, President of NSS Labs, this is important news. “The discoveries that we made in our testing are quite significant. They undermine the false sense of confidence that organizations have had in their firewalls. I think that’s pretty timely considering the number of breaches that been picked up in the media over the last couple weeks.”

Moy also said these types of attacks are difficult to monitor and while technically they can be detected, realistically, it’s quite challenging. “In order to detect the attacks, one would have to have some kind of IDS device on the outside of the firewall looking at low level tcp handshaking in order to establish the session,” Moy said. “Most of the logging done by firewalls and other security devices is done at a high level, so it’s really a sneak attack than would go unnoticed by most organizations.”

“This is by no means a zero day vulnerability, it’s something that’s been documented and publicized in the community for at least a year. We were quite surprised that it wasn’t address by the leading manufacturers,” Moy said. The only firewall tested that passed the TCP split handshake attack was the Check Point Power-1 11065.

NSS Labs said the discoveries surrounding the issues were made in January, and that it planned to release the news at the RSA Conference in February. After working with vendors and giving what it thinks was plenty of time to remediate the issues, NSS is coming forward with its report. “More than sixtry days later, we figured the news is out and the bad guys have known about the attacks for some cases years.  Its important to let the good guys who have these firewalls know bout the problem in their devices so they can remediate themselves and or so they can put pressure on the vendors to release fixes,” Moy told SecurityWeek.

Key findings from the report show:

• Three out of six firewall products failed to remain operational when subjected to our stability tests. This lack of resiliency is alarming, especially considering the tested firewalls were ICSA Labs and Common Criteria certified.

• Five out of six vendors failed to correctly handle the TCP Split Handshake spoof (aka Sneak ACK attack), thus allowing an attacker to bypass the firewall.

• Measuring performance based upon RFC-2544 (UDP) does not provide an accurate representation of how the firewall will perform in live real-world environments.

Firewalls are the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of perimeter security and are considered to be commodity products.

What should a user do if they have a firewall affected by this issue?

According to Moy, it really depends on which firewall you have. “Some of them have remediation steps that a firewall admin can take to close the hole,” Moy said. But Moy also warns to be cautious when making such adjustments to the firewalls configurations. “These may have repercussions on their network performance or ability to communicate with certain types of devices, so we recommend that they perform some type of testing internally before implementing.”

Two devices don’t have remediation at this time.

“IT organizations worldwide have relied on third-party testing and been misled,” said Vik Phatak, CTO, NSS Labs. “These test results point towards the need for a much higher level of continuous testing of network firewalls to ensure they are delivering appropriate security and reliability.”

NSS Labs said that all leading network firewall vendors were invited to participate in the test at no cost. All testing was conducted independently and was not paid for by any vendor.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Cybercrime

More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.