IPsec vulnerable, warns NISCC

By
Follow google news

A major security flaw in an IPsec protocol has been reported by the UK's National Infrastructure Security Co-ordination Centre (NISCC).

According to NISCC, it is possible for an attacker to intercept packets flowing between two IPsec devices, make changes to the encapsulation packet and then access the plaintext form of the inner packet.


"By making careful modifications to selected portions of the payload of the outer packet, an attacker can effect controlled changes to the header of the inner (encrypted) packet," the organization said in a statement.

The attacks apply to potentially any configuration of IPsec using Encapsulating Security Payload (ESP) in tunnel mode with "confidentiality" only, or with integrity protection being provided by a higher layer protocol. Some configurations using Authentication Header (AH) to provide integrity protection are also vulnerable.

NISCC advises that "attacks have been implemented and demonstrated to work under realistic conditions." It recommended configuring ESP to use both confidentiality and integrity protection.

It added that the AH protocol should be used alongside ESP to provide integrity protection. Alternatively, error reporting could be removed by restricting the generation of ICMP messages or by filtering these messages at a firewall or security gateway.

www.niscc.gov.uk

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

The BoM has finally tamed SSL

The BoM has finally tamed SSL

Scores of Australian Cisco devices remain BADCANDY infected

Scores of Australian Cisco devices remain BADCANDY infected

US prosecutors say cyber security pros ran cybercrime operation

US prosecutors say cyber security pros ran cybercrime operation

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Log In

  |  Forgot your password?