Vulnerability Name:

CVE-2012-5032 (CCN-110469)

Assigned:2012-09-21
Published:2012-09-21
Updated:2014-04-23
Summary:The Flex-VPN load-balancing feature in the ipsec-ikev2 implementation in Cisco IOS before 15.1(1)SY3 does not require authentication, which allows remote attackers to trigger the forwarding of VPN traffic to an attacker-controlled destination, or the discarding of this traffic, by arranging for an arbitrary device to become a cluster member, aka Bug ID CSCub93641.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
4.7 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-287
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2012-5032

Source: CCN
Type: Cisco Web site
Release Notes for Cisco IOS Release 12.2(50)SY and Rebuilds for Supervisor Engine 2T-10GE

Source: CONFIRM
Type: UNKNOWN
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/15-1SY/release_notes.pdf

Source: XF
Type: UNKNOWN
ciscoios-cve20125032-sec-bypass(110469)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:15.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:*:*:*:*:*:*:*:* (Version <= 15.1(1)sy2)

  • Configuration CCN 1:
  • cpe:/o:cisco:ios:15.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios 15.1
    cisco ios 15.1(1)sy
    cisco ios 15.1(1)sy1
    cisco ios *
    cisco ios 15.0