It's the same thing every year. Last year was around the ATM and GSM networks hacks. Now, it's OSPF time.
The headlines about the new stunts presented at Vegas at this time of the year are always implying the sky is falling and we should all give up and hand over our data to Anonymous and "State sponsored attackers". Today was no different:
OSPF flaw allows attacks against router domains, tapping of information flows
Looks pretty bad, eh? Until you find this little piece far below in the article:
"The exploit requires one compromised router on the network so the encryption key used for LSA traffic among the routers on the network can be lifted and used by the phantom router. The exploit also requires that the phantom router is connected to the network, Nakibly says."
This reminds me of a guy who would visit banks to show how SSL encryption was broken, doing a "live demo" of his attack. Attack that used to require, as a first step, the victim running an executable sent by the attacker by e-mail :-)
The vulnerability on OSPF might be pretty bad, but that's definitely not something that makes routers using that protocol "open to attacks".
The security press should start putting a little more emphasis on the attack pre-conditions and assumptions before reporting on new attack research. It would certainly avoid FUD and save us some time from explaining to desperate executives why the whole network will not be immediately owned because of that.