Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)
SHARE
back to BLOG

Intruder Vulnerability Bulletin — Cisco IKE Vulnerability (BENIGNCERTAIN)

David Robinson

Leaked from the NSA’s toolkit of private exploits, this recently disclosed Heartbleed-esque vulnerability can allow an attacker anywhere on the internet to extract sensitive information such as private keys from an affected device. This could then allow them to gain unauthorised access to the internal network and any encrypted traffic sent via the device.

The attacker requires the device to be configured to use IKEv1 or IKEv2 and running either:

Cisco has not released a patch or workaround for the vulnerability at this time.

We’ve already checked our customers’ systems and will notify them when an update is made available, but, even if you’re not using Intruder’s continuous monitoring service yet, you can determine if your Cisco devices are vulnerable using the “show version” command.

We recommend monitoring Cisco’s advisory for updates and updating any vulnerable devices as soon as a patch is released. After patching, any private keys on the devices should be regenerated, in case they have been compromised.

Further details of the vulnerability, including a full list of vulnerable software versions can be found at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1

Get Our Free "Ultimate Guide to Vulnerability Scanning"
Learn everything you need to get started with vulnerability scanning and how to get the most out of your chosen product with our free PDF guide.
DOWNLOAD OUR FREE PDF GUIDE 

Written by

David Robinson

Recommended articles

Ready to get started with your 30-day trial?

try for free
BACK TO TOP