04-13-2022 12:07 PM
Hi
When tenable scan, we got vulnerability info as below. Any solution can be used for this issue? Thank you
A remote device is affected by an information disclosure
The IKE service running on the remote Cisco IOS device is affected by
an information disclosure vulnerability, known as BENIGNCERTAIN, in
the Internet Key Exchange version 1 (IKEv1) subsystem due to improper
handling of IKEv1 security negotiation requests. An unauthenticated,
remote attacker can exploit this issue, via a specially crafted IKEv1
packet, to disclose memory contents, resulting in the disclosure of
confidential information including credentials and configuration
settings.
BENIGNCERTAIN is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2016/08/14 by a group known as the Shadow
Brokers.
Solved! Go to Solution.
04-13-2022 12:18 PM - edited 04-13-2022 12:20 PM
@Leftz are you even using IKEv1 on this router? If not remove your IKEv1 policies, including the default
Else...
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1
04-13-2022 12:18 PM - edited 04-13-2022 12:20 PM
@Leftz are you even using IKEv1 on this router? If not remove your IKEv1 policies, including the default
Else...
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160916-ikev1
04-13-2022 03:57 PM
Upgrade the firmware of the router to a version which fixes this vulnerability.
04-25-2022 02:36 PM
@Rob Ingram Which command can confirm it is using IKEv1 or v2?
04-25-2022 11:53 PM
@Leftz Use "show crypto ikev1 sa" or "show crypto ikev2 sa" that will confirm if you are using either IKE version. Your configuration would also indicate which version you are using.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide