First published: Mon Sep 19 2016(Updated: )
The server IKEv1 implementation in Cisco IOS 12.2 through 12.4 and 15.0 through 15.6, IOS XE through 3.18S, IOS XR 4.3.x and 5.0.x through 5.2.x, and PIX before 7.0 allows remote attackers to obtain sensitive information from device memory via a Security Association (SA) negotiation request, aka Bug IDs CSCvb29204 and CSCvb36055 or BENIGNCERTAIN.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | >=12.2<=12.4 | |
Cisco IOS | >=15.0<=15.6 | |
Cisco IOS XE | <=3.18s | |
Cisco IOS XR | >=4.3.0<=4.3.4 | |
Cisco IOS XR | >=5.0.0<5.3.0 | |
Cisco IOS, IOS XR, and IOS XE | ||
>=12.2<=12.4 | ||
>=15.0<=15.6 | ||
<=3.18s | ||
>=4.3.0<=4.3.4 | ||
>=5.0.0<5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6415 is a vulnerability found in Cisco IOS, IOS XR, and IOS XE that allows an attacker to access sensitive information through IKEv1 security negotiation requests.
CVE-2016-6415 affects Cisco IOS, IOS XR, and IOS XE by exposing sensitive information due to insufficient condition checks in the code handling IKEv1 security negotiation requests.
IKEv1 is the Internet Key Exchange version 1 protocol used for setting up secure communication channels in IPsec VPNs.
An attacker can exploit CVE-2016-6415 by sending malicious IKEv1 security negotiation requests to the affected Cisco devices, allowing them to access sensitive information.
To fix CVE-2016-6415, users should apply the recommended security patches provided by Cisco and ensure their Cisco IOS, IOS XR, and IOS XE software is up to date.