Cisco Patches Its Operating Systems Against New IKE Crypto Attack
CISCO SYSTEMS INC. IS THE WORLDWIDE LEADER in networking for the Internet. The company was founded in 1984 by two computer scientists from Stanford University seeking an easier way to connect different types of computer systems.
Cisco Systems shipped its first product in 1986 and is now a multi-national corporation, with over 35,000 employees in more than 115 countries. Today, Cisco solutions are the networking foundations for service providers, small to medium business and enterprise customers which includes corporations, government agencies, utilities and educational institutions.
Cisco, one of the world’s largest vendor of networking equipment, released security updates today to patch a vulnerability in the IOS and IOS XE operating systems that run the vast majority of its devices.
The vulnerability is tracked as CVE-2018-0131 and is one of four CVE identifiers for a new Bleichenbacher oracle cryptographic attack against the IKE (Internet Key Exchange) protocol.
Patches address new cryptographic attack
Researchers say their attack works against the IKEv1 implementations of Cisco (CVE-2018-0131), Huawei (CVE-2017-17305), Clavister (CVE-2018-8753), and ZyXEL (CVE-2018-9129).
The research team, made up of three academics from the Ruhr-University Bochum, Germany and two from the University of Opole, Poland, say they notified vendors that had products vulnerable to this attack.
“All vendors published fixes or removed the particular authentication method from their devices’ firmwares in response to our reports,” researchers said.
Cisco IOS and IOS XE affected, but not IOS XR
Cisco was by far the biggest vendor affected by this flaw, and the hardest hit. CVE-2018-0131 affects the company’s main product, the IOS (Internetworking Operating System), and its Linux-based offshoot, IOS XE.
The IOS XR operating system, which runs on a different codebase and is used mainly for carrier-grade routers, is not affected.
Attackers can recover VPN sessions
According to Cisco, this flaw “could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session.”
“The vulnerability exists because the affected software responds incorrectly to decryption failures. An attacker could exploit this vulnerability sending crafted ciphertexts to a device configured with IKEv1 that uses RSA-encrypted nonces,” Cisco said in a security advisory.
Highest Selling Technical Courses of Indian Cyber Security Solutions:
Cybersecurity services that can protect your company:
Other Location for Online Courses: