TL-R600VPN Failing PCI Scan - ISAKMP supports short block sizes

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

TL-R600VPN Failing PCI Scan - ISAKMP supports short block sizes

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
TL-R600VPN Failing PCI Scan - ISAKMP supports short block sizes
TL-R600VPN Failing PCI Scan - ISAKMP supports short block sizes
2020-12-02 15:17:49 - last edited 2021-04-18 10:35:06
Model: TL-R600VPN  
Hardware Version: V4
Firmware Version: 4.0.4 Build 20200313

My customer is failing a PCI scan with these new routers.  Using a total of 3 routers.  1 router at the primary site and 2 remote sites.  IPSEC L2L vpn setup between remotes and the primary.  I have also enabled encrypted L2TP on the main site router only.  I don't have much configurability with the L2TP so my assumption is that is the weakest link.  What are my options to remedy this?

 

THREAT REFERENCE

Summary:
ISAKMP supports short block sizes (SWEET32 attack)

Risk: High (3)
Port: 500/udp
Protocol: udp
Threat ID: misc_isakmpsweet32

Details: SWEET32 Attack
08/29/16
CVE 2016-2183
Block ciphers with small block sizes are susceptible to a class of attacks known as birthday attacks.
These attacks take advantage of multiple blocks which return identical ciphertext, known as collisions. The probability of collisions occurring becomes significant after a large number of blocks have been encrypted using the same key.
The SWEET32 attack is a specific birthday attack which reveals the XOR (exclusive-OR) between a fixed secret and known plaintext, thus allowing the secret to be determined.
For https services, this attack can be launched in a browser session by javascript code which makes repeated requests containing an authentication token and predictable headers.
Successful exploitation requires about 785 GB of data to be captured, and the attacker must be able to inject javascript into a web session and to sniff data from the network.
Other attacks may be possible against SSH, ISAKMP, and other affected services.

Information From Target:
Service: isakmp
Encryption Algorithm: 3DES-CBC, Hash Algorithm: MD5, Group Description: Diffie-Hellman 1024-bit MODP, Authentication Method: pre-shared key, Life Type: seconds, Life Duration: 28800

  0      
  0      
#1
Options
1 Reply
Re:TL-R600VPN Failing PCI Scan - ISAKMP supports short block sizes
2020-12-03 09:01:23 - last edited 2021-04-18 10:35:06

Dear @JHuggans,

 

Details: SWEET32 Attack
08/29/16
CVE 2016-2183

 

It may be related to the 3DES Encryption. As you can find the description of CVE 2016-2183 from the Internet:

 

"The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack."

 

For your case, you may change the Proposal of IPSec Policy from 3DES to AES (such as AES256) for checking.

By the way, ensure all of the routers are running with the latest firmware.

>> Omada EAP Firmware Trial Available Here << *Try filtering posts on each forum by Label of [Early Access]*
  0  
  0  
#2
Options

Information

Helpful: 0

Views: 803

Replies: 1

Related Articles