- White box Ethernet switches running Linux-based network operating systems like Switch Light, Cumulus Linux, and MLNX-OS have several security weaknesses that could allow remote compromise. These include outdated software, default credentials, insecure agents, and an exposed partition on the ONIE install environment.
- A demonstration showed how a keylogger could capture default credentials, then malware could spread from an infected management station to the switch and even persist after a reboot by modifying the ONIE install process.
- Solutions proposed included secure boot, removing default credentials, securing agents, isolating the management plane, and leveraging SDN/DevOps for auditing and access control. Overall the talk emphasized pressing vendors to prioritize security updates and
Related topics: