First published: Thu Sep 06 2018(Updated: )
The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Key Exchange | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5389 is a vulnerability in the Internet Key Exchange v1 main mode that allows offline dictionary or brute force attacks.
The severity of CVE-2018-5389 is medium, with a severity value of 5.9.
CVE-2018-5389 affects software that implements Internet Key Exchange v1 with a version of 1.0.
To fix CVE-2018-5389, it is recommended to update the software to a version that is not vulnerable or apply patches provided by the vendor.
More information about CVE-2018-5389 can be found at the following references: [link 1], [link 2], [link 3].