Cyber attackers have traditionally focused on compromising endpoints, such as servers, databases, workstations and laptops, to access sensitive data and systems for nefarious purposes. Recently, we’re seeing an increasingly new trend: bad actors targeting network infrastructure.Switches, routers, firewalls, virtual private network (VPN) appliances, domain name servers (DNS) and other network infrastructure tools, once considered secure components, are now battlegrounds as an increasing number of vulnerabilities are discovered, disclosed and exploited.In the last few months alone, CISA has issued warnings about addressing network vulnerabilities in myriad tools, including Juniper Networks' J-Web in Junos OS SRX Series and EX Series, Citrix's NetScaler ADC and NetScaler Gateway, Cisco’s Firepower Threat Defense (FTD) and Adaptive Security Appliance (ASA) software, and Ivanti's Connect Secure and Policy Secure gateways.And, just a few weeks ago, The Register reported that Chinese government group Volt Typhoon compromised an emergency network of a large U.S. city – in part, using some of these network vulnerabilities. Other recent high-profile network infrastructure attacks include those on the Barracuda Email Secure Gateway and Viasat modems.Network infrastructure tools remain a largely unmonitored element in the network – and, when vulnerabilities go undetected, they open a backdoor that cybercriminals can easily walk through.Outside of these two common attack vectors, there are a few other techniques we see at play in network infrastructure attacks, including buffer overflows; privilege escalation, where attackers leverage credentials for lateral movement; and firmware tampering, which we often see in attacks targeting industrial control systems (ICS) and operational technology (OT). Defending against all these threat vectors has become more important than ever because network tools have visibility into and access to critical areas of the network. If cybercriminals exploit these areas, they can see and capture network traffic and data needed to do reconnaissance, map out the network and infiltrate other locations until they find the “golden” assets they’re looking for within.
Common network infrastructure attack vectors
Cybercriminals are primarily targeting network infrastructure tools in two ways:- Remote Code Execution: An RCE lets attackers execute arbitrary code on a device, granting them complete control that they can use to install malware and backdoors for sustained access, steal sensitive log data on the device, disrupt or disable network functionality, and use the compromised device as a launchpad for attacks on other systems in the network. For example, hackers can exploit vulnerabilities in web interfaces, command-line interfaces, and firmware for RCE.
- Denial of Service: A DoS overwhelms the device with traffic or resource-intensive tasks, rendering it unavailable to legitimate users. This can disrupt operations and result in financial losses. Examples of DoS attacks include flooding a device with network packets, exploiting resource-intensive functionalities, or triggering self-denial-of-service mechanisms through vulnerabilities.




