search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco VPN 3000 series concentrator does not properly handle malformed ISAKMP packets

Vulnerability Note VU#761651

Original Release Date: 2002-09-03 | Last Revised: 2002-11-14


Cisco VPN 3000 series concentrators do not properly handle specially crafted Internet Security Association and Key Management Protocol (ISAKMP) packets, which can cause a vulnerable device to reload, denying service to legitimate users.


According to information on the Cisco web site,

The Cisco VPN 3000 Series Concentrators are a family of purpose-built, remote access Virtual Private Network (VPN) platforms and client software that incorporates high availability, high performance and scalability with the most advanced encryption and authentication techniques available today.
The Cisco VPN 3000 series concentrators support the IPsec (RFC 2401) and ISAKMP (RFC 2408) protocols. From RFC 2408:
[ISAKMP]defines procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA). SAs contain all the information required for execution of various network security services, such as the IP layer services (such as header authentication and payload encapsulation), transport or application layer services, or self-protection of negotiation traffic. ISAKMP defines payloads for exchanging key generation and authentication data.
Cisco VPN 3000 series concentrators do not properly calculate the length of ISAKMP messages. Based on the Length field supplied in the ISAKMP header, a zero or negative value may be passed to a malloc() call, resulting in an error that causes the device to reload.

Cisco has released an advisory addressing this and other vulnerablilities in the Cisco VPN 3000 series concentrator. VU#761651 corresponds to Cisco bug ID CSCdy38035. According to the details of the Cisco advisory, this vulnerability can also be exploited by an ISAKMP packet with a large number of payloads or, if debug is enabled, by large or otherwise malformed ISAKMP packets.


An unauthenticated, remote attacker can cause a vulnerable device to reload by sending specially crafted ISAKMP packets to port 500/udp.


Upgrade System Software

Upgrade the system software to release 3.6.1 or later or 3.5.5 or later as specified in the Cisco advisory.

Restrict Access

Restricting access to 500/udp on vulnerable devices will provide some protection, however UDP traffic is relatively easy to spoof, and legitimate clients require access to 500/udp in order to use ISAKMP.

Disable Debug

According to the Cisco advisory, if debug is enabled, a VPN 3000 series concentrator is vulnerable to additional types of ISAKMP packets. Disable debug to prevent some types of ISAKMP packets from affecting a vulnerable device. Note that this is an incomplete solution. Disabling debug will not prevent other types of ISAKMP packets from causing a vulnerable device to reload.

Vendor Information


Cisco Systems Inc. Affected

Notified:  August 21, 2002 Updated: September 03, 2002



Vendor Statement

Cisco has released an advisory that addresses this and other vulnerabilities in the Cisco VPN 3000 series concentrator:

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



The CERT/CC thanks Phenoelit for reporting this vulnerability and Cisco for information used in this document.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2002-1103
Severity Metric: 7.73
Date Public: 2002-09-03
Date First Published: 2002-09-03
Date Last Updated: 2002-11-14 05:04 UTC
Document Revision: 22

Sponsored by CISA.