SLAAC & RA attacks (IPv6)¶
Attack pattern¶
The Stateless Address Autoconfiguration (SLAAC) and Router Advertisement (RA) mechanisms in IPv6 are critical for automatic address assignment and network configuration. However, their lack of inherent authentication makes them vulnerable to exploitation. Attackers can spoof RA messages to manipulate network behaviour, leading to man-in-the-middle (MitM) attacks, traffic interception, and network disruption.
1. Slaac & ra attacks [OR]
1.1 Rogue router advertisement (RA) attacks [OR]
1.1.1 Default gateway spoofing
1.1.1.1 Advertising malicious IPv6 router as default gateway
1.1.1.2 Redirecting traffic through attacker-controlled paths
1.1.2 DNS server spoofing (RDNSS)
1.1.2.1 Injecting rogue DNS server addresses via RA options
1.1.2.2 Hijacking DNS resolution for malicious redirects
1.1.3 Prefix spoofing
1.1.3.1 Advertising fraudulent IPv6 prefixes
1.1.3.2 Forcing hosts to generate addresses from malicious prefixes
1.2 Denial-of-service (DoS) [OR]
1.2.1 RA flooding
1.2.1.1 Overwhelming networks with spoofed RA packets
1.2.1.2 Disrupting legitimate router advertisements
1.2.2 Duplicate address detection (DAD) exploitation
1.2.2.1 Triggering address conflicts to prevent host initialisation
1.2.2.2 Exhausting host resources with fake DAD messages
1.3 Man-in-the-middle (MitM) & interception [OR]
1.3.1 Traffic redirection
1.3.1.1 Intercepting and modifying IPv6 traffic
1.3.1.2 SSL/TLS stripping for unencrypted data capture
1.3.2 Software update hijacking
1.3.2.1 Redirecting update requests to malicious servers
1.3.2.2 Distributing trojanised updates (e.g., TheWizards' Spellbinder tool)
1.4 Evasion & stealth techniques [OR]
1.4.1 Extension header abuse
1.4.1.1 Concealing RA messages in Hop-by-Hop or Destination Options headers
1.4.1.2 Bypassing RA guard protections
1.4.2 Low-rate attacks
1.4.2.1 Sparse RA injections to avoid detection
1.4.2.2 Timing-based evasion of monitoring systems
1.5 Lateral movement & persistence [OR]
1.5.1 Network reconnaissance
1.5.1.1 Mapping IPv6 topology via rogue RAs
1.5.1.2 Identifying high-value targets for further exploitation
1.5.2 Persistent backdoors
1.5.2.1 Maintaining access via malicious default gateways
1.5.2.2 Re-infecting hosts after network resets
1.6 IoT & embedded device targeting [OR]
1.6.1 Resource-constrained exploitation
1.6.1.1 Overloading IoT devices with fraudulent RAs
1.6.1.2 Disrupting critical infrastructure (e.g., ICS/SCADA)
1.6.2 Default configuration abuse
1.6.2.1 Exploiting weak or absent IPv6 security on IoT devices
1.6.2.2 Enabling botnet recruitment via SLAAC
1.7 Cloud & virtualisation attacks [OR]
1.7.1 Virtual network exploitation
1.7.1.1 Spoofing RAs in cloud environments (e.g., AWS VPC, Azure)
1.7.1.2 Bypassing cloud security groups via IPv6
1.7.2 Container network attacks
1.7.2.1 Targeting Kubernetes CNI plugins with malicious RAs
1.7.2.2 Compromising container isolation through IPv6
1.8 IPv4-IPv6 transition attacks [OR]
1.8.1 NAT-PT exploitation
1.8.1.1 Abusing transition mechanisms to redirect IPv4 traffic over IPv6
1.8.1.2 DNS ALG manipulation for address translation bypass
1.8.2 Dual-stack abuse
1.8.2.1 Forcing IPv6 preference over IPv4 for attack enablement
1.8.2.2 Evading IPv4-focused security controls
1.9 Application-specific attacks [OR]
1.9.1 DNS hijacking
1.9.1.1 Poisoning DNS via RDNSS spoofing
1.9.1.2 Targeting specific domains (e.g., software update servers)
1.9.2 VoIP & video conferencing exploitation
1.9.2.1 Intercepting real-time communications
1.9.2.2 Redirecting media streams to attacker endpoints
1.10 Advanced persistent threat (APT) techniques [OR]
1.10.1 Long-term espionage
1.10.1.1 Sustained traffic interception for data exfiltration
1.10.1.2 Targeting specific sectors (e.g., gambling, telecommunications)
1.10.2 Tool customisation
1.10.2.1 Developing bespoke tools (e.g., Spellbinder) for SLAAC exploitation
1.10.2.2 Adapting attacks to evade signature-based detection
Why it works¶
Lack of authentication: RA messages are unauthenticated by default, allowing any device on the local link to advertise itself as a router
Protocol trust model: IPv6 assumes a trusted network environment, making it susceptible to insider threats and lateral movement
Default enablement: Most modern OSes enable IPv6 and prioritise it over IPv4, ensuring attacks work even in dual-stack environments
Limited monitoring: Many organisations neglect IPv6 traffic monitoring, allowing attacks to go undetected
Complexity: IPv6’s increased complexity (e.g., extension headers) creates blind spots in security tools
Mitigation¶
RA guard implementation¶
Action: Deploy RA guard on switches and routers to filter unauthorised RA messages
How:
Cisco IOS: Use the
ipv6 nd raguard policy
command to create policies and apply them to interfacesJunos OS: Configure
forwarding-options access-security slaac-snooping
to validate RA messagesOpen source: Use tools like
radvd
with ACLs to restrict RA sources
Best practice: Combine RA guard with DHCPv6 snooping for comprehensive protection
Secure neighbour discovery (SEND)¶
Action: Implement SEND to cryptographically sign RA and Neighbour Discovery messages
How:
Linux: Use
sendd
or similar daemons to generate cryptographically generated addresses (CGA) and sign messagesEnterprise networks: Deploy SEND-capable routers and ensure host support
Challenge: SEND is complex to deploy and not universally supported, but it is the strongest long-term solution
Network segmentation¶
Action: Segment networks to limit the scope of RA attacks
How:
VLANs: Isolate critical devices into separate VLANs with strict RA policies
Private VLANs (PVLANs): Restrict communication between hosts to prevent lateral movement
Microsegmentation: Use software-defined networking (SDN) to enforce granular policies
Monitoring and detection¶
Action: Actively monitor IPv6 traffic for anomalous RA activity
How:
IDS/IPS: Use Snort, Suricata, or commercial tools with IPv6-specific rules to detect spoofed RAs
SIEM integration: Correlate RA events with other logs for advanced threat detection
Anomaly detection: Deploy machine learning-based tools to identify low-rate or stealthy attacks
Host hardening¶
Action: Configure hosts to resist rogue RA messages
How:
Windows: Use group policy to disable SLAAC or enforce RFC 6106 (RDNSS) security
Linux: Configure
sysctl
parameters (e.g.,net.ipv6.conf.eth0.accept_ra=0
) to disable RA acceptanceEndpoint protection: Ensure EDR solutions support IPv6 attack detection
Disable unused IPv6¶
Action: If IPv6 is not needed, disable it entirely
How:
Network devices: Disable IPv6 on routers, switches, and firewalls
Hosts: Disable IPv6 via OS settings or network adapter properties
Caution: This is not a long-term solution but can reduce attack surface
Encryption and authentication¶
Action: Use encryption to mitigate the impact of successful attacks
How:
DNS: Enforce DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) to prevent RDNSS spoofing
Application traffic: Mandate HTTPS, SSH, and IPsec for all communications
Software updates: Require code signing and HTTPS for update mechanisms
Regular audits and penetration testing¶
Action: Proactively test defences against SLAAC/RA attacks
How:
Red team exercises: Use tools like
Spellbinder
ormitm6
to simulate attacksIPv6 security audits: Regularly review IPv6 configurations and policies
Patch management: Ensure all devices are updated to mitigate known vulnerabilities
Key insights from real-wrld attacks¶
TheWizards APT group: This China-aligned group used a tool called Spellbinder to spoof RA messages, redirect traffic, and hijack software updates (e.g., Sogou Pinyin and Tencent QQ) to deploy malware. This highlights the move from theoretical to practical exploitation of IPv6 weaknesses
Stealth and evasion: Attacks often use extension headers or low-rate techniques to bypass RA guard and avoid detection
IoT and cloud risks: The proliferation of IPv6 in IoT and cloud environments expands the attack surface, making these sectors prime targets
Future trends and recommendations¶
Adoption growth: With IPv6 traffic nearing 50% globally, attacks will increase in sophistication and scale
Automated defence: AI-driven security tools will become essential for detecting anomalous RA activity
Protocol updates: IETF efforts (e.g., draft-ietf-6man-slaac-renum) aim to improve SLAAC robustness against renumbering events and explicit signalling attacks
Vendor collaboration: Closer collaboration between network equipment vendors and security providers is needed to develop integrated solutions
Conclusion¶
SLAAC and RA attacks exploit foundational weaknesses in IPv6’s design, enabling severe threats like MitM, data exfiltration, and network compromise. While mitigations like RA guard and SEND exist, their deployment is often inconsistent. Organisations must adopt a layered defence strategy, combining network hardening, monitoring, and encryption to protect against these evolving threats. As IPv6 adoption accelerates, proactive security measures will be critical to preventing large-scale exploits.