Attackers Can Tunnel into Networks with IPv6

As IPv6 deployment and adoption continues to increase, both implementers and security personnel must be aware of the security risks present in IPv6. Security is just not keeping pace with adoption. That is the message from Command Information’s Cybersecurity CTO, Ron Hulen when he spoke at the Rocky Mountain 2010 IPv6 Summit. Also noted in the company’s news release on PR Newswire, is that the number of IPv6 vulnerabilities that traditional hardware and software vendors can detect is limited because there are significant differences between IPv4 and IPv6 protocols.


“‘The number of IPv6 vulnerabilities that traditional hardware and software assurance vendors can detect is limited because there are significant differences between IPv4 and IPv6 protocols. Traffic traversing through IPv6 transition mechanisms is undetectable by today’s firewalls and routers,’ said Hulen. ‘Attackers are actively using IPv6 to tunnel into networks. Even if IPv6 is not enabled on the network, many of these security concerns still exist.’

“When asked how to address these issues, Hulen encouraged businesses and government ‘to develop security policies and implement security tools to address IPv6 now.'”

Read the Full News Release at PR Newswire

Latest Articles

Follow Us On Social Media

Explore More