Korean
<< Back
VID 29030
Severity 30
Port 161
Protocol UDP
Class CISCO
Detailed Description The CISCO VPN concentrator has a LAN-to-LAN IPSEC tunnel vulnerability (Cisco bug ID CSCdx54675). This vulnerability can be exploited to initiate a denial of service attack.
The Cisco VPN 3000 series concentrator does not drop an incoming LAN-to-LAN connection even when it already has a security association for the same remote network with another device. Instead it disconnects the previously established connection and establishes a connection with the new device. The VPN concentrator also does not verify if the data coming across a LAN-to-LAN connection is being sourced from the correct network.

* Note: This check solely relied on the version number of the remote system to assess this vulnerability, so this might be a false positive. This check also requires a read access SNMP community string to collect the version number. To provide this access, add the valid community string to the check item, "snmp/guessable/r" from the Policy Editor.

* References:
http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml

* Platforms Affected:
Cisco VPN 3000 series concentrator earlier than 3.5.4
Cisco VPN 3000 series concentrator 3.1.x
Cisco VPN 3000 series concentrator 3.0.x
Cisco VPN 3000 series concentrator 2.x.x
Recommendation Upgrade to the Cisco VPN 3000 series concentrator version 3.5.4 or later, and 3.6(Rel) or later. Upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com/kobayashi/sw-center/vpn/3000/ .

For details, see http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)