"BGP Software Vulnerabilities Under the Microscope in Black Hat Session"
In a presentation at Black Hat USA, Forescout researchers will bring attention to Border Gateway Protocol (BGP) implementation flaws. Few technologies are more fundamental to the Internet than BGP, which manages the transmission of data packets between networks. Its prominence on the global web has attracted the attention of state-level actors, the security community, and government agencies. The protocol itself has received the majority of attention from all parties. Daniel dos Santos, a researcher at Forescout, cautions that when people focus excessively on a single issue, they may leave a blind spot. BGP, like any other protocol specification, requires implementations that translate the protocol into code executable on routers. As with all software, this software may contain vulnerabilities. Santos and his collaborators published the findings of a study on seven BGP implementations, including the open source FRRouting, BIRD, and OpenBGPD, as well as the proprietary MikroTik RouterOS, Juniper Junos OS, Cisco IOS, and Arista EOS. Using fuzzing, or automated analysis in which invalid inputs are used to test software for vulnerabilities, they identified three new flaws. This article continues to discuss the discovery of new vulnerabilities in BGP software.
Dark Reading reports "BGP Software Vulnerabilities Under the Microscope in Black Hat Session"