Research > Zero-Day Tracker > 20130719
Cisco IOS GET VPN Encryption Policy Bypass
Patch Not Yet Available
Cisco IOS 15.1M 15.1(4)M, 15.1(4)M0a, 15.1(4)M0b, 15.1(4)M1, 15.1(4)M10, 15.1(4)M2, 15.1(4)M3, 15.1(4)M3a, 15.1(4)M4, 15.1(4)M5, 15.1(4)M6, 15.1(4)M7, and 15.1(4)M8
Cisco IOS contains a vulnerability whereby a remote, unauthenticated attacker could bypass configured encryption policies on a vulnerable IOS device. This could allow an attacker to gain access to sensitive information.
Security Feature Bypass
Cisco IOS contains a vulnerability within the default policies set in place to allow GDOI (Group Domain of Interpretation) traffic to travel in the clear (unencrypted) to allow the GET VPN group members to communicate with VPN key servers. Traffic over UDP port 848 will bypass encryption.
No reasonable mitigations are available currently.
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
19765 - Cisco IOS GET VPN Encryption Policy Bypass (Zero-Day) - SNMP
2013-07-19 - Cisco releases security advisory.
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.