[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability
- From: Cisco Systems Product Security Incident Response Team <psirt@xxxxxxxxx>
- Date: Wed, 26 Mar 2014 12:08:52 -0400
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco IOS Software Internet Key Exchange Version 2 Denial of Service
Vulnerability
Advisory ID: cisco-sa-20140326-ikev2
Revision 1.0
For Public Release 2014 March 26 16:00 UTC (GMT)
Summary
=======
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco
IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote
attacker to cause a reload of the affected device that would lead to a denial
of service (DoS) condition.
The vulnerability is due to how an affected device processes certain malformed
IKEv2 packets. An attacker could exploit this vulnerability by sending
malformed IKEv2 packets to an affected device to be processed. An exploit could
allow the attacker to cause a reload of the affected device that would lead to
a DoS condition.
Although IKEv2 is automatically enabled on Cisco IOS Software and Cisco IOS XE
Software devices when the Internet Security Association and Key Management
Protocol (ISAKMP) is enabled, the vulnerability can be triggered only by
sending a malformed IKEv2 packet.
Only IKEv2 packets can trigger this vulnerability.
Cisco has released free software updates that address this vulnerability.
There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability
or vulnerabilities detailed in the advisory as well as the Cisco IOS Software
releases that correct all Cisco IOS Software vulnerabilities in the March 2014
bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=XFWb
-----END PGP SIGNATURE-----