The denial-of-service vulnerability enables hackers to crash IPSec VPN machines using a specially designed UDP packet. NTA Monitor, the company that discovered the flaw, said it would withhold details of the vulnerability because it is so dangerous.

"We believe this is a serious vulnerability," Roy Hills, technical director of NTA Monitor said. "It's possible to identify Nortel VPN routers using UDP backoff fingerprinting, and an attacker only needs to send a single, small UDP packet to identify the remote systems."

We have determined that it's possible for an attacker with modest resources to scan the entire routed Internet address space within a few weeks, and thus find all of the Nortel VPN router systems," he added.

Hills said the attack was serious because it is possible to find Nortel devices on the internet using simple hacker "fingerprinting" techniques. The attack also requires only a small piece of code to bring down thousands of machines at the same time, he said.

"This packet is less than 300 bytes in size, so an attacker with a 64Kb line could keep more than 7,000 Nortel VPN systems offline continuously, and someone with a 2Mb line has the potential to keep almost a quarter of a million systems offline," he said.

NTA is urging companies to install a software patch that was issued by Nortel on Friday.

"Nortel is aware of the potential issue with Nortel VPN Router portfolio, in which it may be possible for the VPN router or series of VPN routers to become disabled in the course of processing a malformed packet, constituting a denial-of-service attack," Nortel spokesman Pat Cooper said. "While the VPN routers will reboot automatically, this issue has the potential to require manual reboots of the affected VPN routers."

In March, NTA found a password flaw in Nortel's Contivity VPN client for Microsoft Windows.

SOURCE