Cisco released a an advisory (CVE-2016-6415) regarding a vulnerability in IKEv1 that affect Cisco IOS, IOS XE and IOS XR software which could allow an unauthenticated malicious user to retrieve memory content leading to disclosure of confidential information Note: "Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability."[1] The list of affected products is available here. This vulnerability is rated High by Cisco. [1] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1 ----------- |
Guy 418 Posts ISC Handler |
Reply Subscribe |
Sep 17th 2016 1 year ago |
Didn't this happen last month?
|
Anonymous Posts |
Reply Quote |
Sep 17th 2016 1 year ago |
Last month? The critical one from Feb? (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike)
This one is a tad less severe and probably harder to exploit. |
JDoe 7 Posts Posts |
Reply Quote |
Sep 18th 2016 1 year ago |
Quoting Anonymous:Didn't this happen last month? Similar one against PIX last month. Article says they followed up, looking at IOS, and found similar issues, hence this announcement. |
Jaybone 27 Posts Posts |
Reply Quote |
Sep 19th 2016 1 year ago |
I'm still not clear on why they say there's no work-around, but then they also say that it only affects devices running IKE v1, not v2.
How about disabling IKE v1 or just disabling VPN functionality altogether? That may be difficult in some organizations that depend on it, but then again is your VPN is no longer secure or private... |
packetdude 22 Posts Posts |
Reply Quote |
Sep 19th 2016 1 year ago |
Quoting packetdude:I'm still not clear on why they say there's no work-around, but then they also say that it only affects devices running IKE v1, not v2. Checked with PSIRT, and their definition of "workaround" does not include disabling the affected feature. It's the difference between a workaround and a mitigation. (After all, if loss of functionality is acceptable, then "unplug the router" is a dandy and nearly universal workaround...) Please note that, while Cisco is my "day job", I am speaking purely for myself here. |
InfosecJanitor 4 Posts Posts |
Reply Quote |
Sep 20th 2016 1 year ago |
Doesn't an ACL restrict to the peer IP works like a workaround?
|
Anonymous Posts |
Reply Quote |
Sep 21st 2016 1 year ago |
Sign Up for Free or Log In to start participating in the conversation!