Cisco IOS Easy VPN Server may allow unauthorized users to complete XAUTH authentication

2005-06-08T00:00:00
ID VU:344900
Type cert
Reporter CERT
Modified 2005-06-08T18:53:00

Description

Overview

A vulnerability in Cisco IOS Easy VPN Server may allow unauthorized users to complete XAUTH authentication and potentially access private network resources.

Description

Easy VPN Server

Cisco IOS Easy VPN Server allows an IOS device to function as a VPN concentrator, providing authentication and encrypted access to network resources. Easy VPN Server was introduced in IOS 12.2(8)T.

IPSec

IPSec is a set of standards developed by the IETF that provides data confidentiality, integrity, and authentication at the IP layer. IPSec is used by applications such as Virtual Private Networks (VPNs).

Internet Key Exchange (IKE)

IKE (RFC2409) is a protocol that negotiates and provides authenticated keying material for security associations (SAs) in a protected manner. IKE is accomplished by using a combination of ISAKMP (RFC2408) and other protocols. ISAKMP provides a framework for internet key management. The IKE negotiation process consists of two phases. Phase 1 establishes an ISAKMP SA. Phase 2 is used to create SAs for other security protocols.

XAUTH

Extended Authentication (XAUTH) is an extension to IKE. It is defined in the expired document draft-ietf-ipsec-isakmp-xauth-06.txt. XAUTH allows IKE to use existing unidirectional authentication mechanisms after the Phase 1 SA has been established. XAUTH has been rejected by the IETF due to security flaws.

The Problem

When certain packets are sent to a Cisco Easy VPN server on port 500/udp, XAUTH authentication may be completed. This may allow access to network resources. Because XAUTH authentication takes place after the IKE Phase 1 negotiation, an attacker must know the shared group key to successfully perform this attack.


Impact

A remote attacker may be able to gain unintended access to the private network on the affected device.


Solution

Apply a patch or upgrade

Please refer to the "Software Versions and Fixes" section of the Cisco Security Advisory for more information on upgrading.


Do not use XAUTH

XAUTH contains several security flaws and has been rejected by the IETF.

Use strong group passwords

Use strong group passwords as described in the "Workarounds" section of the Cisco Security Advisory. This may help prevent a brute-force attack against the key.


Vendor Information

344900

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems Inc. __ Affected

Updated: April 07, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see the Cisco Security Advisory.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | |
Temporal | |
Environmental | |

References

  • <http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml>
  • <http://secunia.com/advisories/14853>
  • <http://xforce.iss.net/xforce/xfdb/19988>
  • <http://www.securityfocus.com/bid/13031>
  • <http://securitytracker.com/alerts/2005/Apr/1013654.html>
  • <http://www.apps.ietf.org/rfc/rfc2409.html>
  • <http://www.ietf.org/html.charters/ipsec-charter.html>
  • <http://www.apps.ietf.org/rfc/rfc2408.html>

Acknowledgements

This vulnerability was reported by the Cisco Systems Product Security Incident Response Team (PSIRT).

This document was written by Will Dormann.

Other Information

CVE IDs: | CVE-2005-1057
---|---
Severity Metric: | 1.89
Date Public: | 2005-04-06
Date First Published: | 2005-06-08
Date Last Updated: | 2005-06-08 18:53 UTC
Document Revision: | 20