InformationIt is still possible for even known gateways to be compromised. Setting net.ipv4.conf.all.secure_redirects to 0 protects the system from routing table updates by possibly compromised known gateways.
SolutionSet the following parameters in the /etc/sysctl.conf file - net.ipv4.conf.all.secure_redirects = 0
net.ipv4.conf.default.secure_redirects = 0 Run the following commands to set the active kernel parameters - # sysctl -w net.ipv4.conf.all.secure_redirects=0
# sysctl -w net.ipv4.conf.default.secure_redirects=0
# sysctl -w net.ipv4.route.flush=1