Lucene search

K
ciscoCiscoCISCO-SA-20130719-CVE-2013-3436
HistoryJul 19, 2013 - 3:48 p.m.

Cisco IOS GET VPN Encryption Policy Bypass Vulnerability

2013-07-1915:48:18
tools.cisco.com
14

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.9%

A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS could allow traffic to bypass the configured encryption policy.

The vulnerability is due to the default, implicit policies set in place to permit Group Domain of Interpretation (GDOI) traffic to flow unencrypted to allow the GET VPN group members (GMs) to communicate with the GET VPN key servers (KSs). Only transit or to the device traffic using UDP as the transport protocol and port 848 as either the source or destination will bypass the user-defined encryption policies.

Cisco has confirmed this vulnerability in a security notice; however, software updates are not available.

To exploit this vulnerability the attacker would likely need access to trusted, internal networks in which the targeted device may reside. Depending on the network configuration, such systems are typically placed behind network security devices, such as firewalls.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoiosMatchany
OR
ciscoiosMatchany
VendorProductVersionCPE
ciscoiosanycpe:2.3:o:cisco:ios:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.9%

Related for CISCO-SA-20130719-CVE-2013-3436