Executive Summary
Summary | |
---|---|
Title | WPAD Name Collision Vulnerability |
Informations | |||
---|---|---|---|
Name | TA16-144A | First vendor Publication | 2016-05-23 |
Vendor | US-CERT | Last vendor Modification | 2016-06-01 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have been observed reaching public DNS servers [1 [ http://www.Verisign.com/CERTAlert ]]. In combination with the new generic top level domain (gTLD) programs incorporation of previously undelegated gTLDs for public registration, leaked WPAD queries could result in domain name collisions with internal network naming schemes [2 [ https://www.icann.org/resources/pages/name-collision-2013-12-06-en ]] [3 [ https://newgtlds.icann.org/en/about/program ]]. Opportunistic domain registrants could abuse these collisions by configuring external proxies for network traffic and enabling man-in-the-middle (MitM) attacks across the Internet. Description WPAD is a protocol used to ensure all systems in an organization use the same web proxy configuration. Instead of individually modifying configurations on each device connected to a network, WPAD locates a proxy configuration file and applies the configuration automatically. The use of WPAD is enabled by default on all Microsoft Windows operating systems and Internet Explorer browsers. WPAD is supported but not enabled by default on Mac OS X and Linux-based operating systems, as well as Safari, Chrome, and Firefox browsers. With the New gTLD program, previously undelegated gTLD strings are now being delegated for public domain name registration [3 [ https://newgtlds.icann.org/en/about/program ]]. These strings may be used by private or enterprise networks, and in certain circumstances, such as when a work computer is connected from a home or external network, WPAD DNS queries may be made in error to public DNS servers. Attackers may exploit such leaked WPAD queries by registering the leaked domain and setting up MitM proxy configuration files on the Internet. Other services (e.g., mail and internal web sites) may also perform DNS queries and attempt to automatically connect to supposedly internal DNS names [4 [ https://www.us-cert.gov/ncas/alerts/TA15-240A ]]. Impact Leaked WPAD queries could result in domain name collisions with internal network naming schemes. If an attacker registers a domain to answer leaked WPAD queries and configures a valid proxy, there is potential to conduct man-in-the-middle (MitM) attacks across the Internet. The WPAD vulnerability is significant to corporate assets such as laptops. In some cases, these assets are vulnerable even while at work, but observations indicate that most assets become vulnerable when used outside an internal network (e.g., home networks, public Wi-Fi networks). The impact of other types of leaked DNS queries and connection attempts varies depending on the type of service and its configuration. Solution US-CERT encourages users and network administrators to implement the following recommendations to provide a more secure and efficient network infrastructure: * Consider disabling automatic proxy discovery/configuration in browsers and operating systems unless those systems will only be used on internal networks. |
Original Source
Url : http://www.us-cert.gov/ncas/alerts/TA16-144A |
Alert History
Date | Informations |
---|---|
2016-06-29 05:23:44 |
|
2016-06-29 05:23:42 |
|