Page 93 - Cyber Defense eMagazine for September 2020
P. 93

On  June  16,  2020,  recognizing  the  validity  and  danger  of  these vulnerabilities,  the  Department  of
            Homeland  Security’s  Cybersecurity  and  Infrastructure  Security  Agency  (CISA)  issued  a  critical
            security advisory.  “A  remote  attacker  can  exploit  some  of  these  vulnerabilities  to  take  control  of  an
            affected system,” CISA warned, noting that these affect “Treck IP stack implementations for embedded
            systems.” You can read a July 15 update to this advisory here that provides a detailed overview of each
            of the 19 vulnerabilities.

            The CERT Coordination Center at Carnegie Mellon University’s Software Engineering Institute (SEI) also
            published a Vulnerability Note about this issue, stating that most of the 19 vulnerabilities “are caused by
            memory management bugs” and “likely affect industrial control systems and medical devices.” The SEI
            summarized the situation by stating that “a remote, unauthenticated attacker may be able to use specially-
            crafted network packets to cause a denial of service, disclose information, or execute arbitrary code.”


            In short, many cyber security experts believe that we have just begun to discover the magnitude of the
            danger that Ripple20 represents, and even with fixes and patches from the manufacturer, the problem
            won’t go away easily. There are two potential solutions: local security solutions and software-defined
            perimeters (SDP). While some local security solutions have proven ability to provide endpoint security
            for hybrid environments and cloud-based security to protect data as it moves from cloud to cloud and
            within clouds, deployed alone they may not be able to do the trick.

            It’s the same with SDP solutions, which can hide the IoT devices from the general public, by use of SDP’s
            micro-tunnels at the application-level. These give network administrators the ability to segment users and
            devices at the application level rather than the network level. The benefits of this include diminishing the
            threat of lateral network attacks. SDP achieves this outcome by setting strong limits on remote users,
            allowing  them  access  only  to  the  applications  they  require,  with  no  need  for  access  control  lists  or
            firewall policies.

            SDP also enables IoT devices and gateways to communicate with directly to one another by providing
            discreet, private and secure network communications over untrusted networks, such as the public internet
            via User Datagram Protocol (UDP). Companies can thus gain secure connectivity by using randomly
            generated, non-standard UDP ports for on-demand micro-tunnel communications, requiring only one
            UDP message channel between IoT devices and gateways. This helps to secure IoT devices leaving no
            open ports, all but eliminating any surfaces that could remain vulnerable to network attacks.

            SDP solutions are also multi-cloud ready, since placing all operations in a single cloud server is risky.
            SDP software allows for spreading workloads across more than one cloud, which works because of the
            application-specific  micro-tunnels  that  tie  them  together.  This  also  reduces  risk  in  case  of  outages,
            allowing companies to shift operations as needed from cloud to cloud.
            Despite the advantages of SDP, though, if the IoT devices with vulnerabilities from the Trek TCP/IP stack
            are accessible over the local area network, then the devices will still be vulnerable to attacks. At the end
            of  the  day,  SDP  is  a  transport  layer  that  can  provide  private  and  hidden  paths  for  exclusive  data
            hideaways, but local security for such protected destinations is still local. This is why users need to layer
            both solutions. When local and SDP solutions are paired, together they present a virtually unassailable
            defense, which will help safeguard the companies that use this double-tiered strategy from suffering the
            consequences that can result from Ripple20 vulnerabilities.




            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         93
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   88   89   90   91   92   93   94   95   96   97   98