CVE-2019-8580
📋 TL;DR
CVE-2019-8580 is a vulnerability in Apple AirPort base stations where source-routed IPv4 packets were unexpectedly accepted despite being disabled by default. This could allow attackers to bypass network security controls and potentially intercept or manipulate traffic. Only users of affected Apple AirPort base stations are impacted.
💻 Affected Systems
- Apple AirPort Base Station
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker could intercept or manipulate network traffic, perform man-in-the-middle attacks, bypass firewall rules, and potentially gain unauthorized access to internal network resources.
Likely Case
Network traffic manipulation or interception, allowing attackers to monitor sensitive data or redirect connections to malicious destinations.
If Mitigated
Limited impact with proper network segmentation and monitoring; attackers would still need network access and specific knowledge of the target network.
🎯 Exploit Status
Exploitation requires network access and knowledge of source routing techniques; no public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AirPort Base Station Firmware Update 7.8.1 or 7.9.1
Vendor Advisory: https://support.apple.com/en-us/HT210090
Restart Required: Yes
Instructions:
1. Access AirPort Utility on a connected Mac or iOS device. 2. Select your base station. 3. Click 'Update' if available. 4. Follow prompts to install firmware update. 5. The base station will restart automatically.
🔧 Temporary Workarounds
Disable source routing at network perimeter
linuxConfigure network firewalls or routers to block source-routed IPv4 packets at the network perimeter.
# Example for iptables: iptables -A INPUT -m ipv4options --lsrr -j DROP
# Example for iptables: iptables -A INPUT -m ipv4options --ssrr -j DROP
🧯 If You Can't Patch
- Segment AirPort base stations on isolated network segments to limit potential attack surface
- Implement network monitoring for source-routed packet attempts and review firewall logs regularly
🔍 How to Verify
Check if Vulnerable:
Check AirPort base station firmware version in AirPort Utility; versions before 7.8.1/7.9.1 are vulnerable.
Check Version:
Not applicable via command line; must use AirPort Utility graphical interface
Verify Fix Applied:
Confirm firmware version shows 7.8.1 or 7.9.1 in AirPort Utility after update.
📡 Detection & Monitoring
Log Indicators:
- Firewall logs showing blocked source-routed packets
- Network device logs with IP options indicating LSRR or SSRR
Network Indicators:
- Network traffic with IP option 131 (LSRR) or 137 (SSRR) directed at AirPort base stations
SIEM Query:
source_ip:* AND (ip_options:"LSRR" OR ip_options:"SSRR") AND dest_ip:[AirPort_Base_Station_IP]