IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear (2024)

A team of researchers has found vulnerabilities in implementations of the Internet Key Exchange version 1 (IKEv1) protocol in firewalls and other networking gear that support IPsec VPN tunnels. If exploited, the flaw can allow attackers to bypass authentication and impersonate clients or servers.

IKEv1 is an older version of the key exchange protocol used in IPsec, but is still officially supported in IOS, Cisco Systems’ operating system for networking devices. Researchers from Ruhr University Bochum and University of Opole found that it’s also supported in firewalls and networking devices from Huawei, Clavister and ZyXEL, even though it’s not always explicitly advertised or exposed to users.

The researchers found that IKEv1 is vulnerable to Bleichenbacher oracle attacks, a cryptographic attack technique that has been known for almost two decades. ABleichenbacher attack involves sending modified ciphertext to a device and obtaining information about its unencrypted value based on the device’s response. When applied to IKEv1, the attack can be used to obtain the plaintext of the secret nonces exchanged during a handshake and which are normally encrypted with the public keys of the communicating parties.

Furthermore, many implementations reuse the same RSA public-private key pair for all variants of the IKE protocol they support, making the attack worse. In fact, Huawei gear also reuses the device key pair for SSH.

“With our attacks we can impersonate an IKE device: If the attack is successful, we share a set of (falsely) authenticated symmetric keys with the victim device, and can successfully complete the handshake – this holds for both IKEv1 and IKEv2,” said Dennis Felsch, a researcher at Ruhr-University Bochum, in a blog post. “The attacks are based on Bleichenbacher oracles in the IKEv1 implementations of four large network equipment manufacturers: Cisco, Huawei, Clavister, and ZyXEL. These Bleichenbacher oracles can also be used to forge digital signatures, which breaks the signature based IKEv1 and IKEv2 variants.”

IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear (1)

Furthermore, the attackers showed in their research paper that IKE authentication methods based on pre-shared keys (PSKs), as opposed to public key encryption (PKE), can also be broken using a dictionary attack if the used PSK has a low entropy.

“We thus show attacks against all authentication modes in both IKEv1 and IKEv2 under reasonable assumptions,” Felsch said.

Cisco, Huawei, Clavister and ZyXEL have released security advisories and patches this week to address the vulnerabilities in their respective implementations. The vendors have rated the flaw with medium severity.

Smart Home Hubs Leak Data on the Internet

Tens of thousands of smart home hubs and automation servers expose sensitive information over the internet about the devices connected to them. At fault are insecure implementations and misconfigurations of the Message Queuing Telemetry Transport (MQTT) protocol.

MQTT is a protocol originally designed in 1999 for SCADA industrial applications. However, with the advance of home automation in recent years it has gained traction as a method of centrally controlling sensors, light bulbs, window shades, thermostats, door locks and other connected devices.

Users can set up their own MQTT server at home, on a PC or a dedicated device like the Raspberry Pi, using specialized software. The protocol is meant to operate on local networks and supports security features including authentication, but it’s easy for users to misconfigure it.

Researchers from Avast have found that 49,000 MQTT servers are publicly visible on the internet and 32,000 of them have no password protection.

“If the MQTT protocol is not properly configured, cybercriminals can gain complete access to a home and for example, learn when their owners are at home, manipulate entertainment systems, voice assistants, household devices, and physically open smart doors,” Martin Hron, a security expert with Avast, said in a blog post that describes in detail how MQTT can be abused and what attackers can achieve through it.

Lucian Constantin

IKEv1 Vulnerabilities Break IPsec VPN Security in Cisco, Huawei, ZyXEL Gear (2024)
Top Articles
Crypto Seed Phrases vs. Private Keys: What's the Difference?
12 reasons your debit card was declined + fixes | finder.com
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Dmv In Anoka
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Weekly Math Review Q4 3
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Geoffrey Lueilwitz

Last Updated:

Views: 6185

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Geoffrey Lueilwitz

Birthday: 1997-03-23

Address: 74183 Thomas Course, Port Micheal, OK 55446-1529

Phone: +13408645881558

Job: Global Representative

Hobby: Sailing, Vehicle restoration, Rowing, Ghost hunting, Scrapbooking, Rugby, Board sports

Introduction: My name is Geoffrey Lueilwitz, I am a zealous, encouraging, sparkling, enchanting, graceful, faithful, nice person who loves writing and wants to share my knowledge and understanding with you.