Business information leak - NAC
Description
An organization can set its own policies for each user with NAC, it could result in too much information that sometimes overload it. On the other hand, attackers use malicious devices, they install malicious devices between a legitimate device and the switch, compromising and allowing information leakage.
Impact
- Disrupt the NAC infrastructure to make it inaccessible.
- Circumvent the NAC solution by using a man-in-the-middle attack.
Recommendation
- Implement NAC can drastically improve an organizations network security posture.
- A clean NAC solution can greatly increase the difficulty of a successful attack.
- MAC-based NAC should not be used due to it is easy for a hacker to spoof a MAC address.
- Ensure that no devices with access to the internal client network are used in publicly accessible areas.
Threat
Anonymous attacker from the Internet performing man-in-the-middle attack.
Expected Remediation Time
⌚ minutes.
Score
Default score using CVSS 3.1. It may change depending on the context of the src.
Base
- Attack vector: P
- Attack complexity: L
- Privileges required: N
- User interaction: N
- Scope: U
- Confidentiality: L
- Integrity: L
- Availability: N
Temporal
- Exploit code madurity: X
- Remediation level: X
- Report confidence: X
Result
- Vector string: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X
- Score:
- Base: 3.5
- Temporal: 3.5
- Severity:
- Base: Low
- Temporal: Low
Compliant code
The NAC policy is correctly configured
config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set host {string}
set user {string}
next
end
Non compliant code
The NAC policy is based on MAC
config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set mac {mac-address}
set switch-mac-policy {switchPolicy}
next
end
Requirements
- 176.Restrict system objects
- 177.Avoid caching and temporary files
- 261.Avoid exposing sensitive information
- 300.Mask sensitive data
Fixes
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.