search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco Lightweight Extensible Authentication Protocol (LEAP) uses passwords that are vulnerable to dictionary attacks

Vulnerability Note VU#473108

Original Release Date: 2003-10-30 | Last Revised: 2004-05-20

Overview

The Cisco LEAP protocol uses hashed passwords that are vulnerable to dictionary attacks. Successful attackers will be able to gain unauthorized access to affected networks.

Description

The Cisco Lightweight Extensible Authentication Protocol (LEAP) provides an authentication mechanism for IEEE 802.1X wireless clients. The protocol uses passwords to provide authentication between wireless clients and networks and allows both parties to exchange key material for dynamically-generated WEP session keys. Passwords sent over the network are hashed twice using the MD4 algorithm, which prevents casual eavesdroppers from reversing the hashed contents and recovering the original password

The Cisco LEAP protocol is vulnerable to dictionary attacks against users' passwords. Using readily available software, weak passwords can be cracked in a matter of minutes, so it is essential for users to choose good passwords. This vulnerability is common among password-based authentications schemes, and the best protection against this type of attack is to set and enforce password checking policies. For more information on what constitutes a "good" password, please see the CERT/CC Tech Tip, UNIX Configuration Guidelines.

Impact

Attackers can conduct off-line dictionary attacks against passwords, then use cracked passwords to gain unauthorized access to affected networks.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Set and Enforce Password Checking Policies

Site administrators are encouraged to regularly check users' passwords and enforce policies that promote strong passwords. This includes such measures as requiring regular password changes, testing proposed passwords before accepting them, and maintaining a password history to prevent users from reusing passwords.

Use Alternate EAP Authentication Mechanisms

The Cisco LEAP is one of several EAP authentication mechanisms available for IEEE 802.1X networks. Cisco has introduced the EAP-FAST authentication mechanism to address this vulnerability; for more information, please see the Cisco Bulletin. Sites that require restricted access networks should evaluate all available options for authentication.

Vendor Information

473108
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC thanks Michael Renzmann for bringing this vulnerability to our attention.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: None
Severity Metric: 18.98
Date Public: 2003-10-03
Date First Published: 2003-10-30
Date Last Updated: 2004-05-20 19:21 UTC
Document Revision: 38

Sponsored by CISA.