The attack surface exposed by proprietary layer 2 protocols contains hidden bugs that have severe implications to the security of the devices that use them, as well as the networks they belong to. We discovered 5 such zero-day vulnerabilities….
By: Barak Hadad & Ben Seri
Full Abstract & Presentation Materials:
https://www.blackhat.com/asia-20/briefings/schedule/#cdpwn-taking-over-millions-of-enterprise-things-with-layer—zero-days-18806