A security flaw has been reported in the Nokia GGSN (Gateway GPRS support node) that could have lead to a Denial of Service (DoS) attack by hackers. The GGSN (Gateway GPRS support node) is the platform that exists between Gn and Gi networks within a GPRS network. The security firm, @stake notified Nokia of the vulnerability, and Nokia has issued a software update to close the loophole. @stake says that there exists a vulnerability in the TCP stack that allows an attacker to cause the GGSN to kernel panic and shutdown. This potentially allows an attacker to crash all data connectivity within a GPRS based network. This vulnerability is exploited by sending a malformed IP packet with a TCP option of 0xFF over a cellphone to the affected network. In a statement sent to all of Nokia GGSN customers, the company said “Under exceptional circumstances Nokia GGSN release 1 is potentially vulnerable to a “Denial Of Service” style of attack from a malicious user equipped with a computer and a mobile phone. When the vulnerability is exploited the GGSN restarts. There is no damage to the configuration, but some charging data may be lost. Changing a normal Access Point to tunneled (GRE or IP in IP) prevents the attacks from mobile user side. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.