PT-2016-6889 · Cisco · Cisco Pix +3
Published
2016-09-16
·
Updated
2025-01-27
·
CVE-2016-6415
5.0
Medium
Base vector | Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
Cisco IOS versions 12.2 through 12.4 and 15.0 through 15.6
Cisco IOS XE versions through 3.18S
Cisco IOS XR versions 4.3.x and 5.0.x through 5.2.x
Cisco PIX versions prior to 7.0
Description:
A vulnerability in Internet Key Exchange version 1 (IKEv1) packet processing code could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests.
Recommendations:
For Cisco IOS versions 12.2 through 12.4 and 15.0 through 15.6, update to a fixed version once available.
For Cisco IOS XE versions through 3.18S, update to a fixed version once available.
For Cisco IOS XR versions 4.3.x and 5.0.x through 5.2.x, update to a fixed version once available.
For Cisco PIX versions prior to 7.0, update to version 7.0 or later.
As a temporary workaround, consider disabling IKEv1 security negotiation requests on affected devices until a patch is available.
Exploit
Fix
Information Disclosure
Weakness Enumeration
Related Identifiers
Affected Products
References · 12
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ike/cisco_ike_benigncertain.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/nixawk/labs/tree/master/CVE-2016-6415⭐ 1159 🔗 440 · Exploit
- 🔥 https://github.com/3ndG4me/CVE-2016-6415-BenignCertain-Monitor⭐ 10 🔗 2 · Exploit
- 🔥 https://exploit-db.com/exploits/43383 · Exploit
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2016-6415 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1 · Vendor Advisory
- https://cisa.gov/known-exploited-vulnerabilities-catalog · Note
- http://securitytracker.com/id/1036841 · Note
- https://t.me/cvenotify/108773 · Telegram Post
- http://securityfocus.com/bid/93003 · Note
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1 · Note