Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Using the Service Location Protocol (SLP) to Find Exposed Management Interfaces

How to use SLP to find exposed management interfaces

Exposed management interfaces are valuable entry points for attackers. CISA Binding Operational Directive 23-02 calls for getting them off the internet. Here’s a novel approach for finding some of these elusive devices using SLP.

The Cybersecurity and Infrastructure Security Agency (CISA) recently published Binding Operational Directive (BOD) 23-02 instructing U.S. federal agencies to get management interfaces off the internet in order to mitigate risk. CISA defines a networked management interface as a “dedicated device interface that is accessible over network protocols and is meant exclusively for authorized users to perform administrative activities on a device, a group of devices, or the network itself.”

While the CISA guidance is specific to U.S. federal government agencies, the issue is important to any organization. Servers and appliances often have management interfaces used for remote configuration and management of the device. These are typically connected to an out-of-band network segment, but are sometimes inadvertently connected to the Internet either physically or logically. Since these are used to manage servers, networking hardware and more, it’s important for any organization to ensure they are not exposed directly to the internet. They can be difficult to find for several reasons:

  • Networked management interfaces are often proprietary per vendor and may look like just another service in hundreds or thousands of legitimate services offered by an organization.
  • Networked management interfaces may not have any public vulnerabilities associated and therefore won’t be identified via a vulnerability management program.

While there are many ways to identify networked management interfaces that are exposed on the internet, this blog showcases a novel approach that may be useful for finding hard-to-identify devices.

Discovering SLP information

Service Location Protocol (SLP) provides a method to discover information about network services including their existence, location and configuration. Two agent types are used by SLP to catalog and advertise services: a service agent (SA) deals with one or more services while a directory agent (DA) handles services across multiple service agents. Most frequently, service agents advertise services running on the same host while directory agents deal with services across multiple hosts. The services cataloged by SLP include network services, printers, cameras, directory services, storage networks, virtualization infrastructure, web services, automotive systems and more. We can use SLP data obtained from service agents to hunt for services that most likely describe networked management interfaces.

The following plugins for Tenable Vulnerability Management (formerly Tenable.io), Tenable Security Center (formerly Tenable.sc) and Tenable Nessus can be used to send specific SLP requests and parse the results:

Plugin ID

Name

23778

SLP Server Detection (UDP)

23777

SLP Server Detection (TCP)

175142

SLP Find Attributes

The output from the first two SLP Server Detection plugins identifies whether or not the remote host is running the SLP service, whether it’s a directory agent or a service agent, and what services the SLP server knows about. The last plugin, SLP Find Attributes, issues an SLP attribute request command for every service discovered in the first two plugins. This causes the SLP server to list all the attributes it knows about that service, a possible treasure trove of information.

Attributes can be defined per service or even ad-hoc, so the attribute data retrieved does require some analysis. However, looking through SLP data for a scan can show hosts that are leaking information.

Example of plugin 23778 indicating SLP services

how to use SLP to find exposed management interfaces Tenable plugin 23778

Image Source: Tenable, July 2023

Example of plugin 175142 indicating SLP service attributes

How to use SLP to find exposed management interfaces - Tenable plugin 175142

Image Source: Tenable, July 2023

Finding management interfaces

Out-of-band server management interfaces, such as integrated management module (IMM), integrated lights-out (iLo) and integrated Dell remote access controller (iDRAC), can be observed by SLP. It can also identify management interfaces for storage devices, printers and more. The following list of SLP services may include attribute information relating to networked management interfaces:

SLP Service Name

What does it expose?

service:VMwareInfrastructure

VMWare ESX & ESXi

service:cmm.smci

Supermicro Update Manager (SUM)

service:api:https

Dell and HPE storage


 

service:lenovo-smm

Lenovo System Management Module

service:management-hardware.Lenovo:lenovo-xclarity-controller

Lenovo xclarity Controller

service:x-mgmt.avago:lsa

Intel/Avago RAID Management

service:raid.001378:http

Storage devices (QSAN, etc)

service:printer

Printers

service:management-hardware.IBM:integrated-management-module2

service:management-hardware.IBM:integrated-management-module

IBM Management Module

Table Source: Tenable, July 2023

While there are more services worth exploring, these are some of the most common.

A quick scan of the internet for just service:management-hardware or service:management-software services reveals a few listening hosts, though there may be more:

Observed Hosts

SLP Service Name

10,611

service:VMwareInfrastructure

61

service:management-hardware.IBM:integrated-management-module2

58

service:managemen

t-hardware.Lenovo:lenovo-xclarity-controller

3

service:management-software.IBM:platform-agent

3

service:management-hardware.IBM:integrated-management-module

1

service:management-software.IBM:hardware-management-console

Table Source: Tenable, July 2023

For example, the screenshot below shows the web interface for one of the devices discovered using the above scan.

example of a web interface discovered using a Nessus SLP scan

Image Source: Screenshot taken by Tenable of an IBM web interface discovered during an example scan, July 2023

Some of these exposed services may also indicate an internal and external IP address.

service:raid.001378:http
(vendor=Qsan Technology),(model=PerseusAPL),(product=XN3004T),(type=UNIFIED),(hostname=XXXXXX),(version=3.4.2),(builddate=202211290200),(dev=LAN1),(link=Up),(ip=192.168.X.X),(remoteip=XXX.XXX.XXX),(mac=00:13:78:XX:XX:XX),(serial=XXXXXXXXXX),(httpPort=13080),(httpsPort=13443),(webReady=Yes),(flags=0x3),(bpl=XXXX),(qlinkHost=),(qlinkPort=)

We can see that a QSAN NAS device is hosting a management interface on the internal network and internet on ports 13080 and 13443, which correspond with documented management interfaces for these devices.

In Nessus, results will look like this:

How to use SLP to find exposed management interfaces - Tenable Nessus example

Image Source: Tenable, July 2023

Conclusion

Exposed management interfaces are extremely valuable for attackers seeking to find ways into an organization. While there are several ways to identify these exposed management interfaces, we strongly encourage customers to look through the output of the three SLP Nessus plugins on external scans. Wherever those plugins indicate services, especially the services detailed above, investigate the details and check that the listed IPs and ports aren’t exposed to the internet. Also check that the information exposed over SLP is expected for your organization because quite often it is not.

Many recent articles show the importance of keeping management interfaces secured:

Finding exposed management interfaces can be difficult but is an important part of modern attack surface management. CISA intends to scan U.S. federal government agencies and alert them to the presence of exposed management interfaces. Having additional methods to identify exposure will help all organizations understand their exposure and provide additional time to remediate for those in scope for the CISA BOD. Further, customers can utilize all aspects of vulnerability management including Nessus perimeter scans, utilizing audit files, and utilizing Tenable Attack Surface Management (formerly Tenable.asm).

Learn more

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training