Radware Ltd.

04/02/2024 | Press release | Distributed by Public on 04/03/2024 07:10

Loop DoS: Datagram Application-Layer Denial of Service Attacks

On March 19, 2024, a new threat emerged from the research group of Prof. Dr. Christian Rossow at CISPA Helmholtz Center for Information Security in Germany. This threat targets a vulnerability in application-layer services using the User Datagram Protocol (UDP), shedding light on a potentially devastating attack vector.

Dubbed CVE-2024-2169, this vulnerability exposes a flaw in several implementations of UDP application protocols, allowing attackers to exploit it for malicious purposes. The attack vector involves crafting a payload that triggers an error condition in a vulnerable server, prompting it to reply with a failure datagram. When received by another vulnerable server, this failure datagram triggers a cascade of responses between the two systems, creating a perpetual loop of error messages.

What makes this attack particularly insidious is its ability to bypass traditional safeguards like IP Time-to-Live (TTL) hop count limiters. As datagrams are regenerated for every response, the loop condition persists indefinitely, posing a significant challenge for detection and mitigation.

To initiate a loop, attackers need to identify at least one other vulnerable system running the same service. By spoofing the source IP of the initial request, they can trick their victim into responding to another vulnerable server, amplifying the attack by creating multiple loops between systems and overwhelming the target.

The implications of this vulnerability can be far-reaching, affecting hundreds of thousands of publicly exposed servers running vulnerable implementations of DNS, TFTP, NTP, Echo, Chargen, or QOTD. The stateless nature of UDP leaves legitimate services susceptible to abuse, with estimates suggesting that around 300,000 internet hosts are vulnerable to loop DoS attacks.

Detecting vulnerable systems is crucial for preemptive protection. Researchers at CISPA have developed a tool to scan for vulnerable systems, aiding in the identification and mitigation of potential threats. Additionally, organizations are urged to avoid exposing UDP-based services whenever possible, and if unavoidable, ensure they are kept up to date with the latest security patches and protected by robust security solutions.

For more information on this threat alert including attack vectors, affected services, indicators of compromise, and effective DDoS and Web application security essentials, visit the complete Radware Loop DoS Threat Alert.