IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
Solution:
Workaround:
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Link | Tags |
---|---|
https://kb.cert.org/vuls/id/636397/ | third party advisory us government resource |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4 | vendor advisory |
https://www.digi.com/resources/security | third party advisory |
https://www.kb.cert.org/vuls/id/636397 | third party advisory us government resource |
https://datatracker.ietf.org/doc/html/rfc6169 |