NICER Protocol Deep Dive: Internet Exposure of memcached

NICER Protocol Deep Dive: Internet Exposure of memcached

Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet way back in January, we had no idea we'd end up with a hefty, 137-page tome of a research report. The sheer length of such a thing might put off folks who might otherwise learn a thing or two about the nature of internet exposure, so we figured, why not break up all the protocol studies into their own reports?


So, here we are! What follows is taken directly from our National / Industry / Cloud Exposure Report (NICER), so if you don't want to wait around for the next installment, you can cheat and read ahead!



[Research] Read the full NICER report today


Get Started

memcached (UDP/11211)


It's an easy-to-use DDoS Howitzer AND a NoSQL database!


TLDR


WHAT IT IS: An in-memory key-value store, used usually in caching website assets for geographically distributed websites.
HOW MANY: 68,337 discovered nodes. 68,337 (100%) have version fingerprints
VULNERABILITIES: 13 CVEs since 2011, but it has a wicked amplification DDoS issue we cover in the Exposure Information section.
ADVICE: Use it! Just don’t expose it to the internet.ALTERNATIVES: Redis and etcd are two similar, alternative in-memory key-value stores with characteristics similar to memcached.

Memcached is an in-memory key-value store for small chunks of arbitrary data (i.e., strings, binary objects) from results of database calls, API calls, or web page rendering. Its simple design has made it wildly popular, as it promotes quick deployment and ease of development.


Discovery details


Project Sonar found 68,337 exposed memcached hosts, and we did a double-take wh ..

Support the originator by clicking the read the rest link below.