Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw (2024)

Table of Contents
How It Works Patches Roll Out FAQs

The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions.

A new Bleichenbacher oracle cryptographic attack has been set loose on the world, using a 20-year-old protocol flaw to compromise the Internet Key Exchange (IKE) protocol used to secure IP communications.

Specifically, the attack targets IKE’s handshake implementation used for IPsec-based VPN connections. Attackers might be able to use the vulnerability to retrieve IKEv1 session keys and decrypt connections, ultimately opening the door to man-in-the-middle (MitM) attacks or for bad actors to access data carried in VPN sessions.

The consequences could be far-ranging; as is commonly known, VPNs allow employees to securely access a corporate network while they are outside the office. However, they also allow companies to connect their local networks over the public internet, as is the case with the Automotive Network Exchange (ANX), which connects automakers with their suppliers; and in wireless 4G networks, wireless carriers use VPNs to secure the backhaul links between their cell towers and the core network. Dissidents and journalists also use VPNs to circumvent geo-restrictions, hostile surveillance and censorship.

The technique, uncovered by a team of academic researchers from the Ruhr-University Bochum, Germany and the University of Opole, Poland, involves reusing a key pair across different versions and modes of IKE, which can lead to cross-protocol authentication bypass. That allows an attacker to spoof the targeted IPSec endpoint, and to eventually break the encryption mechanism.

“We exploit a Bleichenbacher oracle in an IKEv1 mode, where RSA encrypted nonces are used for authentication,” explained the team, in a paper set to be presented at the Usenix Security Symposium this week. “[The attack covers] all available authentication mechanisms of IKE.”

How It Works

IPsec (Internet Protocol Security) is a protocol stack that protects network packets at the IP layer. But to establish a shared secret for an IPsec connection, the IKE protocol has to be executed. IKE consists of two phases, where Phase 1 is used to establish initial authenticated keying material between two peers. Phase 2 is used to negotiate further derived keys for many different IP-based connections between the two.

The proof-of-concept targets only Phase 1 in IKEv1 and IKEv2, where the attacker impersonates an IKE device.

“Once attackers succeed with this attack on Phase 1, they share a set of (falsely) authenticated symmetric keys with the victim device, and can successfully complete Phase 2 – this holds for both IKEv1 and IKEv2,” the paper detailed.

In IKEv1, four authentication methods are available for Phase 1: Two RSA encryption-based methods, one signature-based method, and a pre-shared key (PSK)-based method.

In IKEv2, Phase 1 omits the encryption-based authentication methods, leaving only signature- and PSK-based authentication methods.

The attacks are based on Bleichenbacher oracles – a 20-year-old protocol threat that has been used through the years to break the confidentiality of TLS when used with RSA encryption. The researchers have now found that these same oracles “can very efficiently be used to decrypt nonces,” which breaks the RSA-encrypted authentication in IKE’s Phase 1.

Also, the paper shows that they can be used to forge digital signatures, which breaks the signature-based authentication in Phase 1; and on the PSK front, offline dictionary attacks are possible, according the researchers, rounding out the protection compromises.

Patches Roll Out

Cisco and Huawei issued patches for the issue yesterday.

For Cisco, the flaw exists in its flagship Internetworking Operating System (IOS), which powers most of its routers and switches, and in its Linux-based offshoot, IOS XE – if the “authentication rsa-encr” option is enabled. Another operating system branch, IOS XR, is used for carrier-grade infrastructure and is not affected.

“The vulnerability exists because the affected software responds incorrectly to decryption failures. An attacker could exploit this vulnerability sending crafted ciphertexts to a device configured with IKEv1 that uses RSA-encrypted nonces,” Cisco explained in its security advisory.

For Huawei’s part, the issue targets IPSec IKEv1 implementations of Huawei Firewall products.

“Remote attackers can decrypt IPSec tunnel ciphertext data by leveraging a Bleichenbacher RSA padding oracle,” the Chinese giant noted in its own advisory. “Successful exploitation of this vulnerability can impact IPSec tunnel security.”

The attack is known to affect IKEv1 implementations by Cisco (CVE-2018-0131), Huawei (CVE-2017-17305), Clavister (CVE-2018-8753, already patched, affecting the Clavister cOS Core) and ZyXEL (CVE-2018-9129, also already patched, affecting all ZyWALL/USG devices).

The academic team previously privately disclosed the problem to the four vendors; however, the paper noted that all versions and variants of the IPsec’s IKE protocol can be broken, if weak PSKs and Bleichenbacher oracles in the IKEv1 PKE and RPKE variants are present – thus, more implementations in major operating systems and network devices could be affected, depending on configuration.

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw (2024)

FAQs

Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw? ›

A new Bleichenbacher oracle cryptographic attack has been set loose on the world, using a 20-year-old protocol flaw to compromise the Internet Key Exchange

Internet Key Exchange
In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP.
https://en.wikipedia.org › wiki › Internet_Key_Exchange
(IKE) protocol used to secure IP communications. Specifically, the attack targets IKE's handshake implementation used for IPsec-based VPN connections.

Has IPsec been compromised? ›

There's also concerns that L2TP/IPsec has been hacked by the United States National Security Agency (NSA). But, since no one knows for sure, L2TP/IPsec is theoretically secure.

What is the major drawback of IPsec? ›

While IPSec provides robust security for IP communications, its major drawback lies in its complexity and the administrative burden it places on network administrators.

What are the vulnerabilities of IPsec protocol? ›

Man in the middle attack

As we already saw, IPSec VPN uses keys to identify each other. In this vulnerability, an attacker may be able to recover a weak Pre-Shared Key. Thus, this attack targets IKE's handshake implementation used for IPsec-based VPN connections. Using these keys, it can decrypt connections.

Is IPsec deprecated? ›

L2TP over IPSec was a popular VPN protocol in the past, but it has become less common and is often deprecated and discouraged for several reasons: Security Concerns: It does NOT provide encryption or confidentiality to traffic passing through it.

Is IPsec outdated? ›

The Dated Legacy: IPsec

IPsec, once a stalwart in secure communications, is now facing its reckoning. As a complex and aging technology, its shortcomings have become increasingly apparent.

Is IPsec still used? ›

IPsec was designed to create a universal standard for internet security and enabled some of the first truly secure internet connections. IPsec isn't the most common internet security protocol you'll use today, but it still has a vital role to play in securing internet communications.

Which is better, IPsec or SSL VPN? ›

With their comprehensive cybersecurity approach, IPsec VPNs protect every bit of data transmitted across the network. SSL VPNs offer targeted protection at the application layer, guarding specific services or apps.

What is the difference between IPsec and VPN? ›

IPsec VPN works on a different network layer than SSL VPN. IPsec VPN operates on the network layer (L3) while SSL VPN operates on the application layer. IPsec VPN uses the Internet Key Exchange (IKE) protocol for key management and authentication.

What is a disadvantage of a VPN that uses SSL instead of IPsec? ›

The main drawback to an SSL VPN is that it can only be used to access web-enabled SSL applications. Also, the client can't access physical network resources such as printers.

What are the 3 main protocols that IPSec uses? ›

Some IPSec protocols are given below.
  • Authentication header (AH)
  • Encapsulating security payload (ESP)
  • Internet key exchange (IKE)

What type of security flaw is there in VPN? ›

DNS (Domain Name System) leaks and WebRTC (Web Real-Time Communication) leaks are vulnerabilities that can occur when using a VPN. DNS leaks occur when a VPN connection fails to properly route DNS requests through the encrypted tunnel, potentially exposing the user's actual IP address and location.

Why not use IPSec? ›

However, IPSec has two major drawbacks. First, it relies on the security of your public keys. If you have poor key management or the integrity of your keys is compromised then you lose the security factor. The second disadvantage is performance.

What is the maximum lifetime of IPsec? ›

Valid values are 60 to 86400.

What is the recommended lifetime for IPsec? ›

We can recommend a lifetime of 86400 seconds for phase 1 and 3600 seconds for phase 2.

What happens when IPsec lifetime expires? ›

IPsec VPNs using IKE utilize lifetimes to control when a tunnel will need to re-establish. When these lifetimes are misconfigured, an IPsec tunnel will still establish but will show connection loss when these timers expire.

Are VPNs compromised? ›

Like any software, all VPNs are technically capable of being hacked. No software is 100% perfect, and VPNs, like any internet-based software, can fall victim to different attacks.

Is IPsec more secure than SSL? ›

Security. In short: Slight edge in favor of SSL. IPSec connections require a pre-shared key to exist on both the client and the server in order to encrypt and send traffic to each other.

What if my VPN has been compromised? ›

When a VPN is hacked, bad actors can gain access to your sensitive information and internet traffic or even make you vulnerable to Man-in-the-Middle (MITM) attacks. This can result in identity theft, fraud, stolen accounts, being infected with malware, and more.

Why not use IPsec? ›

However, IPSec has two major drawbacks. First, it relies on the security of your public keys. If you have poor key management or the integrity of your keys is compromised then you lose the security factor. The second disadvantage is performance.

Top Articles
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 5759

Rating: 4.9 / 5 (79 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.