The default configuration of the Group Encrypted Transport VPN (GET VPN) feature on Cisco IOS uses an improper mechanism for enabling Group Domain of Interpretation (GDOI) traffic flow, which allows remote attackers to bypass the encryption policy via certain uses of UDP port 848, aka Bug ID CSCui07698.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3436 | vendor advisory |
http://osvdb.org/95460 | vdb entry |
http://tools.cisco.com/security/center/viewAlert.x?alertId=30140 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/85868 | vdb entry |
http://www.securityfocus.com/bid/61362 | vdb entry |
http://www.securitytracker.com/id/1028810 | vdb entry |