Outstanding Communications Solutions
Root Canal
A new class of SS7 vulnerabilities
Root Canal A new class of SS7 vulnerabilities Agenda SS7 - - PowerPoint PPT Presentation
Outstanding Communications Solutions Root Canal A new class of SS7 vulnerabilities Agenda SS7 Vulnerable by design Acknowledged signalling vulnerabilities The root problem Mitigation The signaling band-aid A new class
Outstanding Communications Solutions
A new class of SS7 vulnerabilities
2
spectrum SS7
3
4
5
Signaling Vulnerabilities
6
7
8
9
components (CC+NNGT : MCC+MNC)
plausibility of movement
10
11
12
13
Malformed Packets
14
15
infrastructure
16
▪ Denial of Service
Aim is to crash the targeted network element either to influence network performance or steer traffic to alternative links where attacker may have better visibility
memory corruption, infinite nesting
▪ Remote Code Execution
Aims to take control of the targeted network element in order to exfiltrate data, scan network, generate traffic, commit fraud or eavesdrop on network traffic or subscribers
the goal of executing code via controllable crash.
proceed with privilege escalation and full compromise of the network element
17
18
reaches a person
to interrupt this flow or even trap it in an infinite loop & ultimately crash the application
19
20
21
Prerequisites
22
23
24
25
26
27
28
29
Attacking and Tunneling
30
31
32
UE registered in the target network
second stage of infection
hook 2
33
34
35
36
37
38
39
40
extensionContainers both for primary attack and tunneling
ISD from attacker
SS7 Firewall or blocked by default. So extensions may actually pass through firewalls unfiltered
41
42
all other things can be done from a phone)
structures
43
Proposed Mitigation and Limits
Validation of packet size, pointers, nesting levels, adherence to specification
Parameter size/position Flags, bitmasks and format of data, such as invalid structure of parameters or pointers reaching outside the SCCP packet
44
the initial attack must contain both an exploit part and actual code. Some specific SS7 Operations, such as MAP reset, can be monitored specifically for abnormal size
passed through E1/TDM type networks or potentially M2PA links
indication that attack testing is being conducted towards receiving network
45
46
47
Space Layout Randomization does make certain attacks more difficult
processing signaling traffic
been compromised
vendor specific proprietary data structures that an SS7 Firewall may be unable to inspect
48
49
Vulnerable MSC attack simulation
50
Please memset
51
52
53
54