Vulnerability Details : CVE-2002-1623
Potential exploit
The design of the Internet Key Exchange (IKE) protocol, when using Aggressive Mode for shared secret authentication, does not encrypt initiator or responder identities during negotiation, which may allow remote attackers to determine valid usernames by (1) monitoring responses before the password is supplied or (2) sniffing, as originally reported for FireWall-1 SecuRemote.
Products affected by CVE-2002-1623
- cpe:2.3:a:checkpoint:vpn-1_firewall-1:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1_firewall-1:4.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1623
78.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1623
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2002-1623
-
http://marc.info/?l=bugtraq&m=103176164729351&w=2
'RE: SecuRemote usernames can be guessed or sniffed using IKE' - MARC
-
http://lists.grok.org.uk/pipermail/full-disclosure/2002-September/001223.html
[Full-Disclosure] Mailing List Charter
-
http://marc.info/?l=bugtraq&m=103124812629621&w=2
'RE: SecuRemote usernames can be guessed or sniffed using IKE exchange' - MARC
-
http://www.kb.cert.org/vuls/id/886601
VU#886601 - Internet Key Exchange (IKE) protocol discloses identity when Aggressive Mode shared secret authentication is usedUS Government Resource
-
http://www.securiteam.com/securitynews/5TP040U8AW.html
Exploit
-
http://www.securityfocus.com/archive/1/290202
Exploit
-
http://www.securityfocus.com/bid/5607
-
http://www.nta-monitor.com/news/checkpoint.htm
-
http://www.checkpoint.com/techsupport/alerts/ike.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10034
Jump to