Severity: Unknown
Description: IBM i OSPF 6.1, 7.1, 7.2, and 7.3 is vulnerable when a rogue router spoofs its origin. Routing tables are affected by a missing LSA, which may lead to loss of connectivity. IBM X-Force ID: 128379.
CVSS Score: N/A
D
No data available.
No data available.
1. Risk Assessment
The vulnerability CVE-2017-1460 in IBM i OSPF versions 6.1, 7.1, 7.2, and 7.3 presents a moderate risk to organizations utilizing these versions of OSPF. The nature of the vulnerability involves a rogue router successfully spoofing its origin, leading to a missing Link State Advertisement (LSA) and impacting routing tables. This primarily affects availability, potentially causing loss of connectivity. While not directly impacting confidentiality or integrity, loss of connectivity can certainly impact business processes that rely on network communication. The likelihood of exploitation is moderate, requiring a rogue router within the network or a network connected to the affected IBM i systems. The ease of exploitation is also moderate; a moderately skilled attacker could deploy a rogue router with a spoofed origin. The EPSS score of 0.003920000 indicates a relatively low, but not insignificant, probability of exploitation. The business impact can range from minor disruptions to significant outages depending on the criticality of the affected network segments.
2. Potential Attack Scenarios
A potential attack scenario involves an attacker deploying a rogue router onto the network, or compromising an existing router, and configuring it to spoof its origin during the OSPF hello process. The rogue router announces itself as being closer to a destination network than it actually is. This causes the affected IBM i OSPF routers to update their routing tables, potentially directing traffic through the rogue router. This can result in traffic being delayed, dropped, or misdirected. A successful attack could lead to loss of connectivity to key resources, disrupting services like database access, application servers, or external communication. The attacker could strategically choose which networks are affected, potentially isolating specific parts of the organization. The outcome could range from a minor performance degradation to a complete outage, depending on the scope and duration of the attack.
3. Mitigation Recommendations
The primary mitigation for CVE-2017-1460 is to upgrade the affected IBM i OSPF versions to a patched version. IBM provides specific instructions and updates in their support documentation. Immediately patching the vulnerable systems should be prioritized, especially those supporting critical business functions. Beyond patching, consider implementing router authentication mechanisms, such as OSPF authentication, to verify the origin of LSAs and reduce the effectiveness of spoofing attacks. Network segmentation can also limit the blast radius of a successful attack, preventing the rogue router from impacting the entire network. Regularly monitor routing tables for unexpected changes and investigate any anomalies. Refer to the following resources for more information:
IBM Support Document: http://www.ibm.com/support/docview.wss?uid=nas8N1022191
IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/128379
PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2017-1460
4. Executive Summary
IBM i OSPF versions 6.1, 7.1, 7.2, and 7.3 are susceptible to a vulnerability (CVE-2017-1460) that could cause loss of network connectivity. A rogue router can spoof its origin, impacting routing tables and potentially disrupting business operations. While the likelihood of a successful attack is moderate, the potential impact ranges from minor disruptions to significant outages, depending on the criticality of affected network segments. We recommend immediate patching of the vulnerable systems, along with implementation of router authentication and network segmentation to minimize the risk. Addressing this vulnerability is important to ensure reliable network communication and maintain business continuity. Prompt action will mitigate the risk of service disruptions and ensure continued productivity.