First published: Mon Aug 13 2018(Updated: )
A vulnerability in the implementation of RSA-encrypted nonces in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session. The vulnerability exists because the affected software responds incorrectly to decryption failures. An attacker could exploit this vulnerability sending crafted ciphertexts to a device configured with IKEv1 that uses RSA-encrypted nonces. A successful exploit could allow the attacker to obtain the encrypted nonces. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180813-rsa-nonce
Credit: Dennis Felsch RuhrMartin Grothe Ruhr RuhrJörg Schwenk Ruhras well as Adam Czubak University of OpoleMarcin Szymanek University of Opole.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-20180813-rsa-nonce is considered to have a high severity rating.
To fix cisco-sa-20180813-rsa-nonce, upgrade your Cisco IOS Software or Cisco IOS XE Software to a version that includes the security patch.
Cisco IOS Software and Cisco IOS XE Software users are potentially affected by the cisco-sa-20180813-rsa-nonce vulnerability.
An unauthenticated remote attacker can obtain the encrypted nonces of an IKEv1 session due to the cisco-sa-20180813-rsa-nonce vulnerability.
There are no known workarounds for the cisco-sa-20180813-rsa-nonce vulnerability, so upgrading is the recommended approach.