A critical vulnerability has been discovered in multihomed Linux devices. It allows attackers to spoof and inject packets into internal communication streams via an external or public interface.
Security researchers uncovered the flaw during several assessments, and it has been successfully exploited on multiple occasions.
The issue stems from interactions between multihomed Linux devices and common firewall configurations using Linux’s stateful firewall (conntrack module).
The conntrack module, which tracks connections for the stateful firewall, does not account for the interface on which a connection was established.
As a result, a typical firewall rule allowing established and related connections applies to all connections, not just those directed to external hosts.
How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)
This enables an attacker on the external interface to spoof and inject packets into internal traffic flows if they share the same IP address and ports as an established internal connection.
The vulnerability applies to any multihomed Linux device connected to multiple networks. This includes not only obvious targets like NAT routers, but also Linux hosts running virtual machines, VPN servers, embedded devices, automotive systems, and drones.
Any Linux system with multiple interfaces that lacks anti-spoofing firewall rules is likely vulnerable.
Researchers have successfully exploited this vulnerability to:
A video released by the researchers demonstrates corrupting Lidar data by injecting packets into the stream.
There are some limitations to exploiting the vulnerability:
However, despite these limitations, the researchers have successfully exploited the flaw to spoof critical data streams in several scenarios.
To mitigate the vulnerability, the researchers recommend:
They have also released an LD_PRELOAD wrapper tool to help bind sockets to specific interfaces, even for external software where source code is unavailable.
Linux administrators are advised to review their firewall configurations and implement the recommended mitigations to protect multihomed devices from this packet spoofing and injection vulnerability.
Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here
By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…
According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…
A critical security flaw in NVIDIA's Riva framework, an AI-powered speech and translation service, has…
CISA officially added a significant security flaw affecting Broadcom’s Brocade Fabric OS to its authoritative…
A critical vulnerability in Apple’s AirPlay protocol, dubbed AirBorne, has exposed over 2.35 billion active…
A critical vulnerability in Google Chrome has recently been discovered that allows malicious actors to…