Cisco IOS IKEv1 Packet Handling Remote Information Disclosure (cisco-sa-20160916-ikev1) (BENIGNCERTAIN)

Medium Nessus Plugin ID 93736


The remote device is missing a vendor-supplied security patch.


According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by an information disclosure vulnerability, known as BENIGNCERTAIN, in the Internet Key Exchange version 1 (IKEv1) subsystem due to improper handling of IKEv1 security negotiation requests. An unauthenticated, remote attacker can exploit this issue, via a specially crafted IKEv1 packet, to disclose memory contents, resulting in the disclosure of confidential information including credentials and configuration settings.

BENIGNCERTAIN is one of multiple Equation Group vulnerabilities and exploits disclosed on 2016/08/14 by a group known as the Shadow Brokers.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvb29204.

See Also

Plugin Details

Severity: Medium

ID: 93736

File Name: cisco-sa-20160916-ikev1-ios.nasl

Version: 1.9

Type: combined

Family: CISCO

Published: 2016/09/27

Updated: 2019/04/11

Dependencies: 47864

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/09/16

Vulnerability Publication Date: 2016/08/14

Reference Information

CVE: CVE-2016-6415

BID: 93003


CISCO-SA: cisco-sa-20160916-ikev1