If an attacker with access to the network adds a malicious device to the network with the name 'wpad', the attacker may be able to utilize DNS auto-registration and proxy auto-discovery to act as a proxy for victims on the network, resulting in the loss of confidentiality and integrity for any network activity.
Product Family | Severity | Notes |
---|---|---|
NetVanta 600 Series NetVanta 1000 Series NetVanta 3000 Series NetVanta 4000 Series NetVanta 5000 Series NetVanta 6000 Series Total Access 900/900e Series | High | Only affected if the device is functioning as a DHCP server and the DNS proxy is enabled. |
414RG ONT 424RG ONT 434RG ONT | High | |
SDX 810-RG | High |
Product Family | Mitigating Factors | Recommended Actions |
---|---|---|
All | None | No actions to mitigate are available. |
Product Family | Resolution |
---|---|
NetVanta 600 Series NetVanta 1000 Series NetVanta 3000 Series NetVanta 4000 Series NetVanta 5000 Series NetVanta 6000 Series Total Access 900/900e Series | Upgrade to AOS R13.2.2 or later to prevent 'wpad' and 'isatap' from being registered to the DNS proxy. R13.3.0 and R13.3.1 were released prior to R13.2.2 and do not contain the change in behavior. |
414RG ONT 424RG ONT 434RG ONT | Upgrade to ONT Release 9.11.0.1 or later, which prevent 'wpad' and 'isatap' from being registered to the DNS proxy. |
SDX 810-RG | Upgrade to Release 4.1.3 or later, which prevent 'wpad' and 'isatap' from being registered to the DNS proxy. |