Unrated severityNVD Advisory· Published Sep 6, 2018· Updated Aug 5, 2024
CVE-2018-5389
CVE-2018-5389
Description
The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network.
Affected products
1- Range: 5.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-keymitre
- my.f5.com/manage/s/article/K42378447mitre
- web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.htmlmitre
- www.kb.cert.org/vuls/id/857035mitre
- www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdfmitre
News mentions
0No linked articles in our index yet.