{"vuid":"VU#498440","idnumber":"498440","name":"Multiple TCP/IP implementations may use statistically predictable initial sequence numbers","keywords":["TCP","ISN","ISS","tcp_iss","tcp_irs","connection hijacking","spoofing","RFC1948"],"overview":"Attacks against TCP initial sequence number generation have been discussed for some time now. It has long been recognized that the ability to know or predict ISNs can lead to TCP connection hijacking or spoofing. What was not previously illustrated was just how predictable one commonly-used method of randomizing new connection ISNs is in some modern TCP/IP implementations.","clean_desc":"The CERT/CC has received a report from Guardent, Inc. concerning an observed statistical weakness in initial sequence number (ISN) generation for TCP connections. Guardent asserts in copyrighted research forwarded to us that incrementing the ISN by some series of pseudo-random amounts is insufficient to protect some TCP implementations from a practical ISN guessing attack in some real-world situations. Such attacks would not rely on data collected (sniffed) from a a victim site. These observations and statistical analyses provide empirical data which draw attention to the protocol analysis documented by Steve Bellovin (building on work pioneered by Robert Morris), culminating in RFC1948. In RFC1948, Steve noted: The initial sequence numbers are intended to be more or less random. More precisely, RFC 793 specifies that the 32-bit counter be\n   incremented by 1 in the low-order position about every 4\n   microseconds. Instead, Berkeley-derived kernels increment it by a\n   constant every second, and by another constant for each new\n   connection. Thus, if you open a connection to a machine, you know to\n   a very high degree of confidence what sequence number it will use for\n   its next connection. And therein lies the attack. Some TCP/IP implementors chose instead to increment the ISNs using constrained random variables instead of constants. Guardent's research demonstrates that the algorithm implemented in some of these TCP/IP stacks is statistically weak and susceptible to attack. We are currently soliciting feedback from the vendor community to help us understand the scope of this observed statistical weakness. Guardent's work has drawn attention to the fact that not all current TCP/IP stack implementations have implemented RFC1948 or provided an equivalent fix. As of 2015, predictable TCP ISN generation is still somewhat common, particularly in low-power/low-bandwidth, embedded, and IoT devices that use older operating systems and networking code.","impact":"If the ISN of an existing connection can be determined within some practical range, a malicious agent may be able to close or hijack the connection. If the ISNs of future connections are targeted, an agent may be able to \"complete\" a TCP three-way handshake and spoof TCP packets delivered to a victim.","resolution":"Deploy IPsec.","workarounds":"Implement the suggestions in RFC1948, namely the segmentation of the ISN space on a per-host, per-connection basis using cryptographic hashed secrets.","sysaffected":"","thanks":"The CERT/CC thanks the following individuals and organizations for their contributions to this advisory: Steve Bellovin\n, AT&T Labs\nTim Newsham Guardent\n, Inc. BindView\nNiels Provohs","author":"This document was written by Jeffrey S. Havrilla.","public":["http://www.cert.org/advisories/CA-1995-01.html","ftp://research.att.com/dist/internet_security/117.ps.Z","http://pdos.csail.mit.edu/~rtm/papers/117.pdf","ftp://research.att.com/dist/internet_security/ipext.ps.Z","https://www.cs.columbia.edu/~smb/papers/ipext.pdf","https://cseweb.ucsd.edu/classes/sp99/cse227/ipext.pdf","http://lcamtuf.coredump.cx/oldtcp/","http://lcamtuf.coredump.cx/newtcp/","ftp://ftp.isi.edu/in-notes/rfc1948.txt","ftp://ftp.isi.edu/in-notes/rfc793.txt","ftp://ftp.isi.edu/in-notes/rfc1323.txt","ftp://ftp.isi.edu/in-notes/rfc1750.txt","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0328","http://xforce.iss.net/static/139.php","http://www.usenix.com/publications/library/proceedings/security95/full_papers/joncheray.txt","http://www.guardent.com/pr2001-03-12-ips.html","https://www.usenix.org/legacy/publications/library/proceedings/security95/full_papers/joncheray.txt","https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01","https://ics-cert.us-cert.gov/advisories/ICSA-15-153-01"],"cveids":["CVE-2001-0328"],"certadvisory":"CA-2001-09","uscerttechnicalalert":null,"datecreated":"2001-03-05T17:11:44Z","publicdate":"2001-03-12T00:00:00Z","datefirstpublished":"2001-03-13T13:31:20Z","dateupdated":"2015-10-21T03:06:42Z","revision":83,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"2","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"20","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"5","cam_attackeraccessrequired":"18","cam_scorecurrent":"15.1875","cam_scorecurrentwidelyknown":"20.25","cam_scorecurrentwidelyknownexploited":"30.375","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:N/A:P","cvss_temporalscore":"4.8","cvss_environmentalscore":"3.57084963766125","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":15.1875,"vulnote":null}