Lucene search

K
cve[email protected]CVE-2004-0155
HistoryJun 01, 2004 - 4:00 a.m.

CVE-2004-0155

2004-06-0104:00:00
web.nvd.nist.gov
27
kame ike daemon
racoon
phase 1
rsa signature
authentication
unauthorized ip connections
man-in-the-middle
cve-2004-0155
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.2 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.0%

The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.

Affected configurations

NVD
Node
kameracoon
CPENameOperatorVersion
kame:racoonkame racooneq*

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.2 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.0%