The Risks of Ignoring IPv6 in Your Network

23/10/2024

The Risks of Ignoring IPv6 in Your Network

By Carolina Badano, Communications Coordinator at LACNIC

During his presentation at the LACNIC 42 LACNOG 2024 event held in Asunción Paraguay, Henri Alves de Godoy, network analyst and professor at Campinas University, stressed the urgent need to monitor dual-stack networks and underscored the risks of ignoring the IPv6 protocol. The key aspects of his presentation are highlighted below.

IPv6. What is the current state of connectivity?

Despite living in an era where most devices support IPv6 and where adoption rates have already exceeded 50% in countries such as Mexico, Brazil, and Uruguay, Alves noted that it is common for people to approach him saying that they don’t have IPv6 in their networks. “This is a misconception and, at times, a risk because these people don’t understand why the provider does not make use of the global address,” he added.

Moreover, cybercriminals and botnets continue to evolve and are using IPv6.

According to Alves, many honeypots (sensors that collect information about threat actor behavior on the Internet) are not yet configured to collect data over IPv6, and some threat intelligence reports continue to ignore the protocol. The image below shows the percentage of malicious behavior not identified by any security layer.

Source: Morphus Cyber ​​Threat Resilience Report, 2022

As a result, Alves concluded that a portion of traffic is currently not being analyzed, adding that this issue should not be ignored and must be addressed urgently.

(Free access, no subscription required)

What are the risks of ignoring IPv6 in our networks?

When operators ignore the presence of IPv6 in their networks, they cannot implement robust access controls or traffic filters. A simple scan of the IPv4 network could reveal the existence of an IPv6 address, which would allow hackers to move laterally within the internal systems and thus escape detection mechanisms.

Additional reading:

Alves presented three practical examples (tested in a controlled lab environment) that can occur if we don’t monitor IPv6 traffic:

  1. Automatic tunnels: compromise user experience and divert traffic

In some operating systems, these methods are automatically enabled and, if not properly monitored, can redirect traffic, exposing critical vulnerabilities. Tunnels can also create openings for data exfiltration, if employing IPv6 packets encapsulated in IPv4 in a communication that is not properly monitored and protected.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments