CVE-2018-5389
Summary
| CVE | CVE-2018-5389 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-09-06 21:29:00 UTC |
| Updated | 2019-10-09 23:41:00 UTC |
| Description | The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network. |
Risk And Classification
Problem Types: CWE-521
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ietf | Internet Key Exchange | 1.0 | All | All | All |
| Application | Ietf | Internet Key Exchange | 1.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Page not found - Cisco Blogs | MISC | blogs.cisco.com | Third Party Advisory |
| VU#857035 - IKEv1 Main Mode vulnerable to brute force attacks | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| Practical Dictionary Attack on IPsec IKE | MISC | web-in-security.blogspot.com | Exploit, Third Party Advisory |
| www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf | MISC | www.usenix.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Thanks to Martin Grothe, Joerg Schwenk, and Dennis Felsch of the Ruhr-University Bochum, and Adam Czubak and Marcin Szymanek of the University of Opole for reporting this vulnerability.
There are currently no legacy QID mappings associated with this CVE.