Advisory: Support Portal Maintenance. Login is currently unavailable, more info available here.
A recently identified attack known as NAT Slipstreaming can potentially bypass browser protections to compromise an end-user device and then utilize Network Address Translation (NAT) on a firewall or router to allow remote probing of ports and services on the victim’s system behind the firewall or router.
While this attack does not involve a firewall vulnerability and does not require a patch, there are some best-practices we recommend to reduce potential exposure to these types of attack, in particular, patching your browser software.
There are several recommended best-practices to protect against NAT Slipstreaming at various points in the attack chain:
Since the attack is initiated from a compromised or malicious website, ensure that your Sophos Firewall or UTM product has web protection enabled to block malicious websites attempting to use this attack or others. Sophos web protection is very effective at identifying and blocking malicious websites to effectively stop these types of attacks at the source.
Major browser vendors have implemented protection to block port connections used in this attack in upcoming releases. Be sure to promptly apply any available patches as they are made available. Details:
If SIP (VoIP) is not being used, there is an option to disable the SIP module in the firewall which blocks an essential step in the attack. Instructions:
If SIP (VoIP) support is required, we suggest denying traffic on TCP/UDP port 5060/5061 outbound which is utilized by this attack.
Sophos has recently published new IPS signatures for XG Firewall and Cyberoam to detect and block this attack method. For customers using SIP it is recommended that IPS protections be applied to your WAN traffic that include these new signatures (SIDs 2304467 and 2304468).
All network services on client devices such as RDP, SSH, FTP and others should be reviewed regularly and eliminated unless absolutely essential to reduce the surface area of attack. Any services that are essential should be protected with IPS and strong passwords that are changed regularly and managed through a suitable password manager.
Follow typical security best-practices to protect your network from these types of attacks:
NAT Slipstreaming Attack Research