logo

Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller

Conference:  Defcon 26

2018-08-01

Summary

The presentation discusses a multi-stage exploitation attack model on SDN controllers, using previously unknown vulnerabilities to gain control of the controller and execute remote commands.
  • Hackers can exploit vulnerabilities in SDN controllers to gain control of the controller and execute remote commands
  • The attack model involves multiple stages of exploitation, using previously unknown vulnerabilities to gain control of more components in the controller
  • The presentation provides an anecdote of successfully executing a remote command execution chain on an open source SDN controller
  • The impact of the attack model is significant, with the ability to introduce serious attack effects to the controller
  • The presentation highlights the importance of making projects hard to use as a defense against attacks
The presentation provides an anecdote of successfully executing a remote command execution chain on an open source SDN controller, using five previously unknown vulnerabilities in three different stages to gain control of the controller and execute remote commands.

Abstract

Software-Defined Networking (SDN) is now widely deployed in production environments with an ever-growing community. Though SDN's software-based architecture enables network programmability, it also introduces dangerous code vulnerabilities into SDN controllers. However, the decoupled SDN control plane and data plane only communicate with each other with pre-defined protocol interactions, which largely increases the difficulty of exploiting such security weaknesses from the data plane. In this talk, we extend the attack surface and introduce Custom Attack, a novel attack against SDN controllers that leverages legitimate SDN protocol messages (i.e., the custom protocol field) to facilitate Java code vulnerability exploitation. Our research shows that it was possible for a weak adversary to execute arbitrary command or manipulate data in the SDN controller without accessing the SDN controller or any applications, but only controlling a host or a switch. To the best of our knowledge, Custom Attack is the first attack that can remotely compromise SDN software stack to simultaneously cause multiple kinds of attack effects in SDN controllers. Till now we have tested 5 most popular SDN controllers and their applications and found all of them are vulnerable to Custom Attack in some degree. 14 serious vulnerabilities are discovered, all of which can be exploited remotely to launch advanced attacks against controllers (e.g., executing arbitrary commands, exfiltrating confidential files, crashing SDN service, etc.). This presentation will include:

Materials:

Tags: