The Internet Protocol, version 6 (IPv6) was designed to alleviate the address space
limitations of IPv4 and provide additional security and routing capabilities. The protocol
itself, however, can be misused to deliver malware in a way that eludes detection by
firewalls or intrusion detection systems (IDS) not configured to recognize IPv6 traffic.
This problem can be amplified in cases where malware is used to reconfigure vulnerable hosts to allow IPv6 traffic.