Cisco VPN 3000 series concentrator does not properly handle malformed ISAKMP packets

2002-09-03T00:00:00
ID VU:761651
Type cert
Reporter CERT
Modified 2002-11-14T00:00:00

Description

Overview

Cisco VPN 3000 series concentrators do not properly handle specially crafted Internet Security Association and Key Management Protocol (ISAKMP) packets, which can cause a vulnerable device to reload, denying service to legitimate users.

Description

According to information on the Cisco web site,

The Cisco VPN 3000 Series Concentrators are a family of purpose-built, remote access Virtual Private Network (VPN) platforms and client software that incorporates high availability, high performance and scalability with the most advanced encryption and authentication techniques available today.
The Cisco VPN 3000 series concentrators support the IPsec (RFC 2401) and ISAKMP (RFC 2408) protocols. From RFC 2408:
[ISAKMP]defines procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA). SAs contain all the information required for execution of various network security services, such as the IP layer services (such as header authentication and payload encapsulation), transport or application layer services, or self-protection of negotiation traffic. ISAKMP defines payloads for exchanging key generation and authentication data.
Cisco VPN 3000 series concentrators do not properly calculate the length of ISAKMP messages. Based on the Length field supplied in the ISAKMP header, a zero or negative value may be passed to a malloc() call, resulting in an error that causes the device to reload.

Cisco has released an advisory addressing this and other vulnerablilities in the Cisco VPN 3000 series concentrator. VU#761651 corresponds to Cisco bug ID CSCdy38035. According to the details of the Cisco advisory, this vulnerability can also be exploited by an ISAKMP packet with a large number of payloads or, if debug is enabled, by large or otherwise malformed ISAKMP packets.


Impact

An unauthenticated, remote attacker can cause a vulnerable device to reload by sending specially crafted ISAKMP packets to port 500/udp.


Solution

Upgrade System Software

Upgrade the system software to release 3.6.1 or later or 3.5.5 or later as specified in the Cisco advisory.


Restrict Access

Restricting access to 500/udp on vulnerable devices will provide some protection, however UDP traffic is relatively easy to spoof, and legitimate clients require access to 500/udp in order to use ISAKMP.

Disable Debug

According to the Cisco advisory, if debug is enabled, a VPN 3000 series concentrator is vulnerable to additional types of ISAKMP packets. Disable debug to prevent some types of ISAKMP packets from affecting a vulnerable device. Note that this is an incomplete solution. Disabling debug will not prevent other types of ISAKMP packets from causing a vulnerable device to reload.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Cisco Systems Inc.| | 20 Aug 2002| 03 Sep 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml>
  • <http://www.ietf.org/rfc/rfc2401.txt>
  • <http://www.ietf.org/rfc/rfc2408.txt>
  • <http://online.securityfocus.com/bid/5609>
  • <http://online.securityfocus.com/bid/5619>
  • <http://online.securityfocus.com/archive/82/292506/2002-09-13/2002-09-19/0>
  • <http://www.iss.net/security_center/static/10028.php>

Credit

The CERT/CC thanks Phenoelit for reporting this vulnerability and Cisco for information used in this document.

This document was written by Art Manion.

Other Information

  • CVE IDs: CAN-2002-1103
  • Date Public: 03 Sep 2002
  • Date First Published: 03 Sep 2002
  • Date Last Updated: 14 Nov 2002
  • Severity Metric: 7.73
  • Document Revision: 22