论文标题

非常可PWN的网络:Cisco AnyConnect安全分析

Very Pwnable Network: Cisco AnyConnect Security Analysis

论文作者

Roitburd, Gerbert, Ortmann, Matthias, Hollick, Matthias, Classen, Jiska

论文摘要

公司虚拟专用网络(VPN)使用户可以在家或旅行时工作。同时,VPN与公司的网络基础架构相关,迫使用户出于网络兼容性原因安装专有客户端。 VPN客户端具有高度特权,可以加密和重新路由网络流量。因此,VPN客户端中的错误对用户和公司网络构成了重大风险。 Cisco是Enterprise Network Hardware的主导供应商,它与其AnyConnect客户端提供VPN连接,用于台式机和移动设备。虽然过去的安全性研究主要集中在AnyConnect Windows客户端,但我们表明Linux和iOS基于不同的体系结构,并且存在不同的安全问题。我们的反向工程以及后续设计分析和模糊揭示了13个新漏洞。其中七个位于Linux客户端。 Linux上特权升级的根本原因是在客户端的架构中如此深入的,以至于它只能用部分解决方法进行修补。对iOS的类似分析发现了三个AnyConnect特定的错误以及iOS网络扩展中的三个一般问题,这些问题适用于各种VPN,并且不限于任何连接。

Corporate Virtual Private Networks (VPNs) enable users to work from home or while traveling. At the same time, VPNs are tied to a company's network infrastructure, forcing users to install proprietary clients for network compatibility reasons. VPN clients run with high privileges to encrypt and reroute network traffic. Thus, bugs in VPN clients pose a substantial risk to their users and in turn the corporate network. Cisco, the dominating vendor of enterprise network hardware, offers VPN connectivity with their AnyConnect client for desktop and mobile devices. While past security research primarily focused on the AnyConnect Windows client, we show that Linux and iOS are based on different architectures and have distinct security issues. Our reverse engineering as well as the follow-up design analysis and fuzzing reveal 13 new vulnerabilities. Seven of these are located in the Linux client. The root cause for privilege escalations on Linux is anchored so deep in the client's architecture that it only got patched with a partial workaround. A similar analysis on iOS uncovers three AnyConnect-specific bugs as well as three general issues in iOS network extensions, which apply to all kinds of VPNs and are not restricted to AnyConnect.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源