Short Name |
IKE:KAME-RACOON-X509-CERT-VERIF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
IKE |
Keywords |
KAME racoon X509 Certificate Verification |
Release Date |
2014/02/18 |
Update Number |
2346 |
Supported Platforms |
idp-5.0.110121210+, isg-3.4.139899+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against IKE daemon of KAME racoon. A successful attack can establish a trusted secure connection with the target using invalid X.509 certificate.
Racoon improperly validates X.509 certificates when negotiating IPSec connections. When checking certificate validity, Racoon ignores many errors from OpenSSL and grants access to invalid certificates. When ignoring these errors, Racoon allows improper certificates to be used when authenticating connections. This vulnerability could allow attackers to forge certificates and potentially gain access to IPSec VPNs. This would also effectively make all certificates permanent. It is unknown which versions of Racoon are vulnerable at this time.