Executive Risk Summary
"A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper parsing of IKEv2 packets and can be exploited by sending crafted IKEv2 packets to an affected device."
Anticipated Attack Path
- 1. An attacker sends crafted IKEv2 packets to an affected device.
- 2. The device improperly parses the packets, triggering a memory leak.
- 3. The memory leak results in a denial of service (DoS) condition, causing the device to reload or become unstable.
Am I Vulnerable?
- Is my device running a vulnerable version of Cisco IOS Software or IOS XE Software?
- Is the IKEv2 feature enabled on my device?
- Have I applied the latest security patches and updates to my device?
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Network connectivity may be disrupted during the patching process.
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly