04-22-2020 12:27 AM - edited 04-22-2020 12:30 AM
We are planning to patch for Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key vulnerability.
Description
The remote Internet Key Exchange (IKE) version 1 service seems to support Aggressive Mode with Pre-Shared key (PSK) authentication. Such a configuration could allow an attacker to capture and crack the PSK of a VPN gateway and gain unauthorized access to private networks.
I saw below the solution for the issue
- Disable Aggressive Mode is supported.
- Do not use Pre-Shared key for authentication if it's possible.
- If using Pre-Shared key cannot be avoided, use very strong keys.
- If possible, do not allow VPN connections from any IP addresses.
Can we avoid affecting current active users to deploy the solution? I need your suggestion.
04-22-2020 01:21 AM
Is this report for ASA or for router.
instead of using aggressive mode better use a main mode with complex key with different characters
04-22-2020 01:45 AM
Its for ASA.
04-22-2020 02:01 AM
You do not tell us if you are using aggressive mode in your environment.
04-22-2020 02:09 AM
My Question is
Can we avoid affecting current active users to deploy the solution?
04-22-2020 02:14 AM
If you use aggressive mode (only you can know that), your users are affected. If you don't use aggressive mode, you can safely implement the needed countermeasures.
04-22-2020 03:15 AM
@Karsten Iwen would it not better to moved to main mode as it much better compare to aggressive mode.
personally i recommend it to move to ikev2 instead of running ikev1 as ikev1 is gone legacy.
04-22-2020 03:27 AM
Yes, for sure. Moving to main-mode and/or IKEv2 is the solution. But based on the implemented technologies it's not always that easy. But yes, everyone should have ideally moved away from Aggressive mode better yesterday than later.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide