Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
AND |
|
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-07-27T22:00:00
Updated: 2018-10-17T20:57:01
Reserved: 2006-07-27T00:00:00
Link: CVE-2006-3906
JSON object: View
NVD Information
Status : Modified
Published: 2006-07-27T22:04:00.000
Modified: 2023-08-11T19:02:04.560
Link: CVE-2006-3906
JSON object: View
Redhat Information
No data.
CWE