search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Internet Key Exchange (IKE) protocol discloses identity when Aggressive Mode shared secret authentication is used

Vulnerability Note VU#886601

Original Release Date: 2002-09-12 | Last Revised: 2003-04-04

Overview

The Internet Key Exchange (IKE) protocol discloses username information when Aggressive Mode is used for shared secret authentication.

Description

The Internet Key Exchange (IKE) protocol provides a negotiation mechanism that allows an initiator to establish an encrypted session with a responder. Many firewall and Virtual Private Network (VPN) products use IKE; check your product documentation to determine which modes and authentication methods are used by your product.

By design, the IKE protocol does not encrypt the identities of the initiator or responder when performing shared secret authentication in Aggressive Mode. Depending upon your site configuration and need for identity protection, this design choice may represent a vulnerability to your organization.

Impact

Devices that implement this protocol as specified will leak username information while negotiating IKE sessions. This information may be useful for conducting reconnaissance on networks containing an affected device.

Solution

Use an alternative mode and authentication method

The IKE protocol provides many options for both connection mode and authentication method; several combinations provide identity protection. For example, both Main Mode with shared secret authentication and Aggressive Mode with public key authentication provide identity protection.

Vendor Information

886601
 

View all 48 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

The CERT/CC thanks Roy Hills for reporting this issue.

This document was written by Jeffrey P. Lanza.

Other Information

CVE IDs: None
Severity Metric: 0.65
Date Public: 2002-09-03
Date First Published: 2002-09-12
Date Last Updated: 2003-04-04 19:12 UTC
Document Revision: 23

Sponsored by CISA.