Skip to main content

Business information leak - NAC

Description

An organization can set its own policies for each user with NAC, it could result in too much information that sometimes overload it. On the other hand, attackers use malicious devices, they install malicious devices between a legitimate device and the switch, compromising and allowing information leakage.

Impact

  • Disrupt the NAC infrastructure to make it inaccessible.
  • Circumvent the NAC solution by using a man-in-the-middle attack.

Recommendation

  • Implement NAC can drastically improve an organizations network security posture.
  • A clean NAC solution can greatly increase the difficulty of a successful attack.
  • MAC-based NAC should not be used due to it is easy for a hacker to spoof a MAC address.
  • Ensure that no devices with access to the internal client network are used in publicly accessible areas.

Threat

Anonymous attacker from the Internet performing man-in-the-middle attack.

Expected Remediation Time

⌚ 60 minutes.

Score

Default score using CVSS 3.1. It may change depending on the context of the vulnerability.

Base

  • Attack vector: P
  • Attack complexity: L
  • Privileges required: N
  • User interaction: N
  • Scope: U
  • Confidentiality: L
  • Integrity: L
  • Availability: N

Temporal

  • Exploit code madurity: X
  • Remediation level: X
  • Report confidence: X

Result

  • Vector string: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X
  • Score:
    • Base: 3.5
    • Temporal: 3.5
  • Severity:
    • Base: Low
    • Temporal: Low

Code Examples

Compliant code

The NAC policy is correctly configured

config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set host {string}
set user {string}
next
end

Non compliant code

The NAC policy is based on MAC

config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set mac {mac-address}
set switch-mac-policy {switchPolicy}
next
end

Requirements