Bug 1829625 (CVE-2020-10136) - CVE-2020-10136 kernel: IP-in-IP protocol routes arbitrary traffic by default
Summary: CVE-2020-10136 kernel: IP-in-IP protocol routes arbitrary traffic by default
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-10136
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1829627
TreeView+ depends on / blocked
 
Reported: 2020-04-29 22:00 UTC by Pedro Sampaio
Modified: 2021-02-16 20:10 UTC (History)
48 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2020-06-18 17:20:23 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2020-04-29 22:00:14 UTC
A flaw was found in the IP-in-IP protocol. An unauthenticated attacker can use the IP-in-IP protocol to route network traffic through a vulnerable device, which can lead to spoofing, access control bypasses, and other unexpected network behaviors.

Comment 1 Wade Mealing 2020-05-18 05:46:29 UTC
Statement:

The IP-in-IP encapsulation is 'in the clear' tunnel protocol between two hosts.    When the module is loaded, the system will be in an 'any-to-any' routing state.  It will accept any "IP in IP" packets and forward them through the system routing chains.

No authentication, encryption or restrictions is created between endpoints by the kernel module.  Until a configuration rule is set, any system that can send "IP in IP" packets to an unconfigured system with the ipip kernel module loaded will be unwrapped and forwarded.  There is an area of opportunity between module loading and configuration that may allow for an attacker to abuse this flaw. 

When a tunnel device is created this will restrict the source and destination of the tunnelled packets. The content of the tunnelled data remains unencrypted and unauthenticated.

Red Hat Product Security strongly recommends using authenticated and encrypted tunnels such as IPSec, VPN or libreswan if tunnelling between networks is required.

Comment 4 Wade Mealing 2020-05-18 06:56:29 UTC
Mitigation:

Systems that have IP in IP kernel modules loaded will need to unload the "ipip" kernel module and blacklist it to prevent the module from being used a fix has been provided ( See https://access.redhat.com/solutions/41278 for a guide on how to blacklist modules). 

Take careful consideration that if unloading and blacklisting the module, this may create a one-time attack vector window for a local attacker.

Consider using an alternative authenticated and encrypted tunnelling protocol until a suitable solution is developed.

Comment 7 Product Security DevOps Team 2020-06-18 17:20:23 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-10136


Note You need to log in before you can comment on or make changes to this bug.