Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Researchers Break Down NAC Defenses

Researchers will demonstrate new ways to bypass Network Access Control technologies at the Black Hat conference later this month

If you think currently available Network Access Control technology is going to put that much-needed fence around your organization's most sensitive data, think again. A security research team says it has found ways to bypass all NAC systems, no matter which vendor makes them.

Researchers at Insightix, a security software vendor based in Ra'anana, Israel, later this month will show how they've broken the defenses of virtually every NAC vendor in a presentation at the Black Hat conference in Las Vegas.

"Each NAC product works a little differently, but in every case, we found the means to bypass it," says Ofir Arkin, CTO and co-founder of Insightix.

The vulnerabilities lie primarily in the way current NAC products are designed, Arkin explains. For example, most NAC technology assumes that users will be granted access to the network via Dynamic Host Control Protocol (DHCP), which keeps IP addresses in a pool and hands them out as each user is authenticated. Through DHCP, NAC systems can restrict user access and recognize unauthorized attempts to gain entry to sensitive information.

However, an insider with access to the corporate network often has the option to configure his PC with a static IP address, Arkin observes. With a valid IP address, the insider could effectively bypass all of the NAC controls and remain undetected by NAC defenses.

"All you really need is a user name and password, and you can do whatever you like," Arkin says.

The NAC market is dominated by heavyweights like Cisco, Juniper, and Microsoft, among others, like Check Point, Enterasys, and Symantec.

NAC systems are also at risk because they normally work entirely through IP addresses, without collecting information on where devices are located or how they are connected to the network, Arkin states. NAC systems generally cannot detect activity between nodes on the same subnet, particularly if the client avoids broadcast transmissions.

"That means if you can find the address of the router, which is contained in TCP/IP settings on most PCs, you can link directly to the router and enter the network undetected," Arkin says. Users could also gain access through unauthorized devices or old, forgotten systems and connections that don't show up in a standard DHCP address discovery.

Insightix has not found any examples of these exploits in the wild, but the approaches used by its research team could be easily reproduced by a company insider or by an attacker who steals even a single username and password, Arkin says.

Not surprisingly, Insightix is offering products that could help close the vulnerabilities in NAC systems. The Insightix NAC solution, introduced three weeks ago, includes a network discovery tool that not only shows DHCP addresses, but static IP addresses and details on how clients and devices are connected to the network.

"We can see all of the elements on the network and classify them, so that the [administrator] can find the elements that shouldn't be there," Arkin says. "A lot of users are surprised at the access points they find that they didn't know were there."

Arkin's full presentation, which will go through the NAC vulnerabilities on a vendor-by-vendor basis, will take place at Black Hat on Aug. 2.

— Tim Wilson, Site Editor, Dark Reading

Organizations mentioned in this article:

  • Check Point Software Technologies Ltd. (Nasdaq: CHKP)
  • Cisco Systems Inc. (Nasdaq: CSCO)
  • Enterasys Networks Inc. (NYSE: ETS)
  • Insightix Ltd.
  • Juniper Networks Inc. (Nasdaq: JNPR)
  • Microsoft Corp. (Nasdaq: MSFT)
  • Symantec Corp. (Nasdaq: SYMC)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    When It Comes To Security Tools, More Isn't More
    Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
    US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
    Seth Rosenblatt, Contributing Writer,  1/11/2021
    IoT Vendor Ubiquiti Suffers Data Breach
    Dark Reading Staff 1/11/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-01-17
    Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
    PUBLISHED: 2021-01-15
    An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
    PUBLISHED: 2021-01-15
    Docker Desktop Community before on macOS mishandles certificate checking, leading to local privilege escalation.
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
    PUBLISHED: 2021-01-15
    OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...