Vulnerability Name: | CVE-2018-5389 (CCN-148398) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-08-14 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-08-14 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:U/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:U/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-521 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-5389 Source: CCN Type: US-CERT VU#857035 IKEv1 Main Mode vulnerable to brute force attacks Source: MISC Type: Third Party Advisory https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key Source: XF Type: UNKNOWN ikev1-cve20185389-info-disc(148398) Source: CCN Type: Web-Security and -Insecurity Blog, August 13, 2018 Practical Dictionary Attack on IPsec IKE Source: MISC Type: Exploit, Third Party Advisory https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#857035 Source: MISC Type: Third Party Advisory https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |