IPv6 is the next generation of the Internet Protocol that is being deployed around the world to replace IPv4. In the design of IPv6, extension headers allow the protocol to be flexible, enabling optional features, such as fragmentation or encryption. However, the complexity of this design often leads to vulnerabilities that can affect millions of hosts worldwide. In this paper, we propose a new methodology that exploits differential fuzzing to uncover and analyze vulnerabilities in IPv6 network stack implementations. We run a thorough set of experiments to validate the methodology on several operating systems, such as Windows, Linux, and FreeBSD, uncovering two firewall policies bypass and multiple fingerprinting possibilities. The results highlight the danger of vulnerabilities at this level of the network stack and underscore the importance of testing IPv6 as it becomes the core part of the Internet. Researchers and implementers can use our proposed methodology to look for security issues in other operating systems in a semi-automatic way.

Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing / Bassetti, E.; Di Paolo, E.; Drago, F.; Conti, M.; Spognardi, A.. - 15825 LNCS:(2025), pp. 401-423. ( ACNS Munich; Germany ) [10.1007/978-3-031-95761-1_14].

Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing

Bassetti E.;Di Paolo E.;Spognardi A.
2025

Abstract

IPv6 is the next generation of the Internet Protocol that is being deployed around the world to replace IPv4. In the design of IPv6, extension headers allow the protocol to be flexible, enabling optional features, such as fragmentation or encryption. However, the complexity of this design often leads to vulnerabilities that can affect millions of hosts worldwide. In this paper, we propose a new methodology that exploits differential fuzzing to uncover and analyze vulnerabilities in IPv6 network stack implementations. We run a thorough set of experiments to validate the methodology on several operating systems, such as Windows, Linux, and FreeBSD, uncovering two firewall policies bypass and multiple fingerprinting possibilities. The results highlight the danger of vulnerabilities at this level of the network stack and underscore the importance of testing IPv6 as it becomes the core part of the Internet. Researchers and implementers can use our proposed methodology to look for security issues in other operating systems in a semi-automatic way.
2025
ACNS
IPv6; differential fuzzing; extension headers
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing / Bassetti, E.; Di Paolo, E.; Drago, F.; Conti, M.; Spognardi, A.. - 15825 LNCS:(2025), pp. 401-423. ( ACNS Munich; Germany ) [10.1007/978-3-031-95761-1_14].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1747579
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact