Finding and mitigating the risk of vulnerabilities in BGP implementations

Logo
Presented by

Daniel dos Santos, Head of Security Research, Vedere Labs

About this talk

Forescout Vedere Labs recently disclosed three new vulnerabilities on a popular Border Gateway Protocol (BGP) open-source implementation. These vulnerabilities highlight message parsing as an often-overlooked aspect of BGP security and they could be exploited to achieve a denial of service on vulnerable peers, thus dropping all sessions and routing tables. Recent BGP incidents show that it might take only a malformed packet to cause potentially large disruptions since software suites implementing BGP are used by major networking vendors and found in ISPs and large data centers. Therefore, organizations should not rely only on their ISPs to handle BGP security. This research shows that modern BGP implementations still have low-hanging fruits that attackers can abuse. Learn how we found the three new vulnerabilities, what their risk is, and what to do to mitigate these risks. Speaker: Daniel dos Santos, Head of Security Research at Vedere Labs
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (28)
Subscribers (2831)
The Forescout platform provides organizations with complete situational awareness of their extended enterprise and the ability to orchestrate actions to reduce cyber risk. Learn more about our products, hear about new cybersecurity trends and see how Forescout helps you address these.