Cisco Bug: CSCuj73916 - Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability
Last Modified
Jul 03, 2020
Products (13)
- Cisco IOS
- Cisco ASR 901-6CZ-F-D Router
- Cisco ME 3600X-24TS-M Switch
- Cisco ASR 901-4C-FT-D Router
- Cisco ASR 901-6CZ-F-A Router
- Cisco ASR 901-6CZ-FT-A Router
- Cisco ASR 901-12C-FT-D Router
- Cisco ME 3600X-24FS-M Switch
- Cisco ME 3600X-24CX-M Switch
- Cisco ASR 901-6CZ-FT-D Router

Known Affected Releases
15.3(3)S
Description (partial)
Symptom: A vulnerability in the Internet Key Exchange version 1 (IKEv1) of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to an improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets during an IKE negotiation. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos Conditions: See Affected Products Section of the Advisory. To determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker on Cisco.com at the following link: https://tools.cisco.com/security/center/softwarechecker.x
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Status
- Severity
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases