Vulnerable Systems:
* Cisco ASA 5500 Series Adaptive Security Appliances
* Cisco PIX 500 Series Security Appliances
* Cisco VPN 3000 Series Concentrators model 3005
* Cisco VPN 3000 Series Concentrators model 3015
* Cisco VPN 3000 Series Concentrators model 3020
* Cisco VPN 3000 Series Concentrators model 3030
* Cisco VPN 3000 Series Concentrators model 3060
* Cisco VPN 3000 Series Concentrators model 3080
Due to the device(s) returning differing responses to IKE requests it is possible to enumerate valid group names from the VPN device(s). With the correct group name the pre-shared key can then be captured and a brute-force attack carried out off-line.
This output shows an aggressive query against the device specifying an invalid group:
Starting ike-scan 1.9 with 1 hosts
(http://www.nta-monitor.com/tools/ike-scan/)
By checking the responses for this additional VID it is possible to enumerate the valid group name.
This has been replicated in testing against a number of PIX based devices and with the valid group name the PSK can then be collected and cracked using psk-crack.
Patches can be downloaded from Cisco's online support portal at: http://www.cisco.com
Disclosure Timeline:
Discovered: 20 March 2009
Released: 8 November 2010
Approved: 8 November 2010
Reported: 8 November 2010
Fixed: 1 December 2010
Published: 22 March 2011